Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/01/2024, 09:21
Behavioral task
behavioral1
Sample
5612603a71f3ec5ea43e2349f67ac7cb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5612603a71f3ec5ea43e2349f67ac7cb.exe
Resource
win10v2004-20231215-en
General
-
Target
5612603a71f3ec5ea43e2349f67ac7cb.exe
-
Size
3.2MB
-
MD5
5612603a71f3ec5ea43e2349f67ac7cb
-
SHA1
b7e0b18359393e844ee3adc7e12c71fa9338a88c
-
SHA256
cbeb22baadb651aad9315ae8d14f756ff7af2888cfb11c22ab3c0958bfff57a0
-
SHA512
531631ddcc598c418f956cc6deda86cd63a43773f7ca1c2673d2a7fec29d64180adcc1e10353a60ce5465bf6a717570567803e839f6423c176e31e4b42fd9aae
-
SSDEEP
98304:pVVvCW7cakcQK48/nBcakcxsuK8nB40cakcQK48/nBcakcO:PVvRdlQq/BdlxX40dlQq/BdlO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2268 5612603a71f3ec5ea43e2349f67ac7cb.exe -
Executes dropped EXE 1 IoCs
pid Process 2268 5612603a71f3ec5ea43e2349f67ac7cb.exe -
Loads dropped DLL 1 IoCs
pid Process 2212 5612603a71f3ec5ea43e2349f67ac7cb.exe -
resource yara_rule behavioral1/memory/2212-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000b00000001225f-11.dat upx behavioral1/files/0x000b00000001225f-17.dat upx behavioral1/memory/2268-19-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/memory/2212-15-0x00000000236C0000-0x000000002391C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2980 schtasks.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 5612603a71f3ec5ea43e2349f67ac7cb.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 030000000100000014000000a053375bfe84e8b748782c7cee15827a6af5a405140000000100000014000000142eb317b75856cbae500940e61faf9d8b14c2c6040000000100000010000000e829e65d7c4307d6fbc13c179e037a360f0000000100000020000000444ebd67bb83f8807b3921e938ac9178b882bd50aadb11231f044cf5f08df7ce190000000100000010000000f044424c506513d62804c04f719403f91800000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000001a05000030820516308202fea003020102021100912b084acf0c18a753f6d62e25a75f5a300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3230303930343030303030305a170d3235303931353136303030305a3032310b300906035504061302555331163014060355040a130d4c6574277320456e6372797074310b300906035504031302523330820122300d06092a864886f70d01010105000382010f003082010a0282010100bb021528ccf6a094d30f12ec8d5592c3f882f199a67a4288a75d26aab52bb9c54cb1af8e6bf975c8a3d70f4794145535578c9ea8a23919f5823c42a94e6ef53bc32edb8dc0b05cf35938e7edcf69f05a0b1bbec094242587fa3771b313e71cace19befdbe43b45524596a9c153ce34c852eeb5aeed8fde6070e2a554abb66d0e97a540346b2bd3bc66eb66347cfa6b8b8f572999f830175dba726ffb81c5add286583d17c7e709bbf12bf786dcc1da715dd446e3ccad25c188bc60677566b3f118f7a25ce653ff3a88b647a5ff1318ea9809773f9d53f9cf01e5f5a6701714af63a4ff99b3939ddc53a706fe48851da169ae2575bb13cc5203f5ed51a18bdb150203010001a382010830820104300e0603551d0f0101ff040403020186301d0603551d250416301406082b0601050507030206082b0601050507030130120603551d130101ff040830060101ff020100301d0603551d0e04160414142eb317b75856cbae500940e61faf9d8b14c2c6301f0603551d2304183016801479b459e67bb6e5e40173800888c81a58f6e99b6e303206082b0601050507010104263024302206082b060105050730028616687474703a2f2f78312e692e6c656e63722e6f72672f30270603551d1f0420301e301ca01aa0188616687474703a2f2f78312e632e6c656e63722e6f72672f30220603551d20041b30193008060667810c010201300d060b2b0601040182df13010101300d06092a864886f70d01010b0500038202010085ca4e473ea3f7854485bcd56778b29863ad754d1e963d336572542d81a0eac3edf820bf5fccb77000b76e3bf65e94dee4209fa6ef8bb203e7a2b5163c91ceb4ed3902e77c258a47e6656e3f46f4d9f0ce942bee54ce12bc8c274bb8c1982fa2afcd71914a08b7c8b8237b042d08f908573e83d904330a472178098227c32ac89bb9ce5cf264c8c0be79c04f8e6d440c5e92bb2ef78b10e1e81d4429db5920ed63b921f81226949357a01d6504c10a22ae100d4397a1181f7ee0e08637b55ab1bd30bf876e2b2aff214e1b05c3f51897f05eacc3a5b86af02ebc3b33b9ee4bdeccfce4af840b863fc0554336f668e136176a8e99d1ffa540a734b7c0d063393539756ef2ba76c89302e9a94b6c17ce0c02d9bd81fb9fb768d40665b3823d7753f88e7903ad0a3107752a43d8559772c4290ef7c45d4ec8ae468430d7f2855f18a179bbe75e708b07e18693c3b98fdc6171252aafdfed255052688b92dce5d6b5e3da7dd0876c842131ae82f5fbb9abc889173de14ce5380ef6bd2bbd968114ebd5db3d20a77e59d3e2f858f95bb848cdfe5c4f1629fe1e5523afc811b08dea7c9390172ffdaca20947463ff0e9b0b7ff284d6832d6675e1e69a393b8f59d8b2f0bd25243a66f3257654d3281df3853855d7e5d6629eab8dde495b5cdb5561242cdc44ec6253844506decce005518fee94964d44eca979cb45bc073a8abb847c2 5612603a71f3ec5ea43e2349f67ac7cb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 5612603a71f3ec5ea43e2349f67ac7cb.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 5612603a71f3ec5ea43e2349f67ac7cb.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2212 5612603a71f3ec5ea43e2349f67ac7cb.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2212 5612603a71f3ec5ea43e2349f67ac7cb.exe 2268 5612603a71f3ec5ea43e2349f67ac7cb.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2268 2212 5612603a71f3ec5ea43e2349f67ac7cb.exe 29 PID 2212 wrote to memory of 2268 2212 5612603a71f3ec5ea43e2349f67ac7cb.exe 29 PID 2212 wrote to memory of 2268 2212 5612603a71f3ec5ea43e2349f67ac7cb.exe 29 PID 2212 wrote to memory of 2268 2212 5612603a71f3ec5ea43e2349f67ac7cb.exe 29 PID 2268 wrote to memory of 2980 2268 5612603a71f3ec5ea43e2349f67ac7cb.exe 30 PID 2268 wrote to memory of 2980 2268 5612603a71f3ec5ea43e2349f67ac7cb.exe 30 PID 2268 wrote to memory of 2980 2268 5612603a71f3ec5ea43e2349f67ac7cb.exe 30 PID 2268 wrote to memory of 2980 2268 5612603a71f3ec5ea43e2349f67ac7cb.exe 30 PID 2268 wrote to memory of 2856 2268 5612603a71f3ec5ea43e2349f67ac7cb.exe 32 PID 2268 wrote to memory of 2856 2268 5612603a71f3ec5ea43e2349f67ac7cb.exe 32 PID 2268 wrote to memory of 2856 2268 5612603a71f3ec5ea43e2349f67ac7cb.exe 32 PID 2268 wrote to memory of 2856 2268 5612603a71f3ec5ea43e2349f67ac7cb.exe 32 PID 2856 wrote to memory of 2796 2856 cmd.exe 34 PID 2856 wrote to memory of 2796 2856 cmd.exe 34 PID 2856 wrote to memory of 2796 2856 cmd.exe 34 PID 2856 wrote to memory of 2796 2856 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\5612603a71f3ec5ea43e2349f67ac7cb.exe"C:\Users\Admin\AppData\Local\Temp\5612603a71f3ec5ea43e2349f67ac7cb.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\5612603a71f3ec5ea43e2349f67ac7cb.exeC:\Users\Admin\AppData\Local\Temp\5612603a71f3ec5ea43e2349f67ac7cb.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\5612603a71f3ec5ea43e2349f67ac7cb.exe" /TN Nnb8kaFf43a4 /F3⤵
- Creates scheduled task(s)
PID:2980
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN Nnb8kaFf43a4 > C:\Users\Admin\AppData\Local\Temp\ZWEDionv.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN Nnb8kaFf43a44⤵PID:2796
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5b45f3b9711a728262f6e7c37307341e7
SHA1cea6930d15e57a302bceda01e398ba6a0d3339f5
SHA256efa5daf31807f24c8168c22cfdefa9c082b0d9322c671541943ddd80e93d67a8
SHA512f54b218dac3cffcdfcaf92dbad480a0d2e8171005406e05d2b17605e23bd8fa79019517831865b6aeb103c215b0694aaf4f43265a3ba965d2a89d15ffcad4cc9
-
Filesize
1KB
MD5775acbf08b2e24a1d10bf070e4d7d576
SHA14d784b19051d8e58c90c9ac8e12d582006dc6753
SHA256cdb8986d945e8b724f57a97c707407e9d94d5dd473604d33612d876f6df0742a
SHA5129649ff58809aa8c8d824b78b08e4e670ffcf903796b5acee3998846e275ad733da1e43ad2c25787a7719aa54ccab2e7efa0d4165bfc63a319e02d7645a12699d
-
Filesize
2.4MB
MD5ec544939f49c348679a85432260db595
SHA10ea2dadc3a89535b90fa639484ab166c78d34a6d
SHA2567dc89393288ae2176833a77d87987d13b3422294d566d43ba8b521217f9a615d
SHA5128e0c7dc8273c1eb02f164c0cf153efa06a0a2fce3dc97c0a9768163fb40d9ca12978c1d0ab4493a5ca0d1c2f5aeb7cf29568284cf58a20294610b0cd2586e24c