Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
15/01/2024, 01:10
Behavioral task
behavioral1
Sample
5bbd9716a0f1f54b4e5e9bd5696d0114.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5bbd9716a0f1f54b4e5e9bd5696d0114.exe
Resource
win10v2004-20231215-en
General
-
Target
5bbd9716a0f1f54b4e5e9bd5696d0114.exe
-
Size
1003KB
-
MD5
5bbd9716a0f1f54b4e5e9bd5696d0114
-
SHA1
0ed8daf6419d5c0369fb54f3fe0999f0841a724f
-
SHA256
8a866f9ac9fa1c3c4ddc51873e86fb3d5d30a170790be61b8e7fd26ece04aaf7
-
SHA512
195f51718054b9f71b8c1e367d18704dc2a39469a31448eba82bbe67c4ba92c75436774c78b3028fd759c8b51bea130621e05549b3358c5db0b3c0f9019b16a4
-
SSDEEP
24576:Il13imYdUYHLnnxV1QeEAnGQoadai7D3uITjIFOxo53ApIj:IDymGUYHLnnx8eEgGQ7ai7D3xTgOxYw0
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2084 5bbd9716a0f1f54b4e5e9bd5696d0114.exe -
Executes dropped EXE 1 IoCs
pid Process 2084 5bbd9716a0f1f54b4e5e9bd5696d0114.exe -
Loads dropped DLL 1 IoCs
pid Process 1216 5bbd9716a0f1f54b4e5e9bd5696d0114.exe -
resource yara_rule behavioral1/memory/1216-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000c00000001220d-15.dat upx behavioral1/files/0x000c00000001220d-11.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2652 schtasks.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 5bbd9716a0f1f54b4e5e9bd5696d0114.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 5bbd9716a0f1f54b4e5e9bd5696d0114.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 5bbd9716a0f1f54b4e5e9bd5696d0114.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 5bbd9716a0f1f54b4e5e9bd5696d0114.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1216 5bbd9716a0f1f54b4e5e9bd5696d0114.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1216 5bbd9716a0f1f54b4e5e9bd5696d0114.exe 2084 5bbd9716a0f1f54b4e5e9bd5696d0114.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1216 wrote to memory of 2084 1216 5bbd9716a0f1f54b4e5e9bd5696d0114.exe 29 PID 1216 wrote to memory of 2084 1216 5bbd9716a0f1f54b4e5e9bd5696d0114.exe 29 PID 1216 wrote to memory of 2084 1216 5bbd9716a0f1f54b4e5e9bd5696d0114.exe 29 PID 1216 wrote to memory of 2084 1216 5bbd9716a0f1f54b4e5e9bd5696d0114.exe 29 PID 2084 wrote to memory of 2652 2084 5bbd9716a0f1f54b4e5e9bd5696d0114.exe 30 PID 2084 wrote to memory of 2652 2084 5bbd9716a0f1f54b4e5e9bd5696d0114.exe 30 PID 2084 wrote to memory of 2652 2084 5bbd9716a0f1f54b4e5e9bd5696d0114.exe 30 PID 2084 wrote to memory of 2652 2084 5bbd9716a0f1f54b4e5e9bd5696d0114.exe 30 PID 2084 wrote to memory of 2640 2084 5bbd9716a0f1f54b4e5e9bd5696d0114.exe 34 PID 2084 wrote to memory of 2640 2084 5bbd9716a0f1f54b4e5e9bd5696d0114.exe 34 PID 2084 wrote to memory of 2640 2084 5bbd9716a0f1f54b4e5e9bd5696d0114.exe 34 PID 2084 wrote to memory of 2640 2084 5bbd9716a0f1f54b4e5e9bd5696d0114.exe 34 PID 2640 wrote to memory of 2856 2640 cmd.exe 32 PID 2640 wrote to memory of 2856 2640 cmd.exe 32 PID 2640 wrote to memory of 2856 2640 cmd.exe 32 PID 2640 wrote to memory of 2856 2640 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bbd9716a0f1f54b4e5e9bd5696d0114.exe"C:\Users\Admin\AppData\Local\Temp\5bbd9716a0f1f54b4e5e9bd5696d0114.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\5bbd9716a0f1f54b4e5e9bd5696d0114.exeC:\Users\Admin\AppData\Local\Temp\5bbd9716a0f1f54b4e5e9bd5696d0114.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\5bbd9716a0f1f54b4e5e9bd5696d0114.exe" /TN qm2lmOfce5f6 /F3⤵
- Creates scheduled task(s)
PID:2652
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN qm2lmOfce5f6 > C:\Users\Admin\AppData\Local\Temp\7uMczqjZH.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2640
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN qm2lmOfce5f61⤵PID:2856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
234KB
MD57ea6effea8fc64104a59cececaecd627
SHA163241c895b29eafc804b54782e378da84ea5bbef
SHA256afc192a2ce6baf4501a0d8a7523a17ed18e90c0e158bcdcba34d14a5089303ad
SHA5123a200003e8da6ae290cfa625144651806bf2045f77d79e056181c71be8608061cec9c745f7fadb405ccfb712f41307c9cd95fa894b22550f8c5db1d27d5d3f24
-
Filesize
1KB
MD5203716e3f421804b97dfd043b5e37e84
SHA12f28c1bb5b88b41bd5396d4a2f48601d6883a562
SHA256d187ea68c060eacf01c502c4565b604fa6b37824e626b9ae800cddc7f581ff48
SHA512a33ec79a69d88df51c8227343a779adeac55f6b579fe83e762b27de0fdae3ff1fd41996d38da8ca8d68441ebce5457ff0b4588f2a7790810581a1d8301f042c8
-
Filesize
467KB
MD52c7cfb663174821cfad163b4a7dd6d3a
SHA1b585f2e746e2708060c3a208aa0ba6d72cd25f1d
SHA2567157e78b665ef30619e4190acb20106dd51941742e086a8246a56eae661099fb
SHA512aa2429f55897d60350b33935450284ee90c5baa841dd574d63110c57a71914772d92d43feb97c282f9560794d87c9733999eab96aa11bdc8573542a82ded5bb5