Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 07:12
Behavioral task
behavioral1
Sample
670252e303e14b0b7c8cc55566ef58b8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
670252e303e14b0b7c8cc55566ef58b8.exe
Resource
win10v2004-20231222-en
General
-
Target
670252e303e14b0b7c8cc55566ef58b8.exe
-
Size
1.5MB
-
MD5
670252e303e14b0b7c8cc55566ef58b8
-
SHA1
556e9cb2bc97a78f66fb78585dc5c1c6966c63cb
-
SHA256
4b0c714f8bdab709b20c0aa389751d9974a24bd208c0bb6b377faee57c7d5bfd
-
SHA512
c87a702abbc7deaedd36b8ec87f13e4f391adae0a615518dec8e7b9de3570e9bd803d30f08ed440e32cdecdcfe6a6d54ebf88eaf749e5efd447aee0649b7300a
-
SSDEEP
24576:hnJFv/q7Bf3H12GOJcjukL2aNc14RxVDW7K5lAleicjukL2Y:hnJFv/q7Bf3H12GOJcakLXNckxk7K5lj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3008 670252e303e14b0b7c8cc55566ef58b8.exe -
Executes dropped EXE 1 IoCs
pid Process 3008 670252e303e14b0b7c8cc55566ef58b8.exe -
Loads dropped DLL 1 IoCs
pid Process 2032 670252e303e14b0b7c8cc55566ef58b8.exe -
resource yara_rule behavioral1/memory/2032-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000e000000012247-11.dat upx behavioral1/memory/3008-19-0x0000000000400000-0x000000000065C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2820 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 670252e303e14b0b7c8cc55566ef58b8.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 670252e303e14b0b7c8cc55566ef58b8.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 670252e303e14b0b7c8cc55566ef58b8.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 670252e303e14b0b7c8cc55566ef58b8.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2032 670252e303e14b0b7c8cc55566ef58b8.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2032 670252e303e14b0b7c8cc55566ef58b8.exe 3008 670252e303e14b0b7c8cc55566ef58b8.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2032 wrote to memory of 3008 2032 670252e303e14b0b7c8cc55566ef58b8.exe 29 PID 2032 wrote to memory of 3008 2032 670252e303e14b0b7c8cc55566ef58b8.exe 29 PID 2032 wrote to memory of 3008 2032 670252e303e14b0b7c8cc55566ef58b8.exe 29 PID 2032 wrote to memory of 3008 2032 670252e303e14b0b7c8cc55566ef58b8.exe 29 PID 3008 wrote to memory of 2820 3008 670252e303e14b0b7c8cc55566ef58b8.exe 30 PID 3008 wrote to memory of 2820 3008 670252e303e14b0b7c8cc55566ef58b8.exe 30 PID 3008 wrote to memory of 2820 3008 670252e303e14b0b7c8cc55566ef58b8.exe 30 PID 3008 wrote to memory of 2820 3008 670252e303e14b0b7c8cc55566ef58b8.exe 30 PID 3008 wrote to memory of 2588 3008 670252e303e14b0b7c8cc55566ef58b8.exe 32 PID 3008 wrote to memory of 2588 3008 670252e303e14b0b7c8cc55566ef58b8.exe 32 PID 3008 wrote to memory of 2588 3008 670252e303e14b0b7c8cc55566ef58b8.exe 32 PID 3008 wrote to memory of 2588 3008 670252e303e14b0b7c8cc55566ef58b8.exe 32 PID 2588 wrote to memory of 2708 2588 cmd.exe 34 PID 2588 wrote to memory of 2708 2588 cmd.exe 34 PID 2588 wrote to memory of 2708 2588 cmd.exe 34 PID 2588 wrote to memory of 2708 2588 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\670252e303e14b0b7c8cc55566ef58b8.exe"C:\Users\Admin\AppData\Local\Temp\670252e303e14b0b7c8cc55566ef58b8.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\670252e303e14b0b7c8cc55566ef58b8.exeC:\Users\Admin\AppData\Local\Temp\670252e303e14b0b7c8cc55566ef58b8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\670252e303e14b0b7c8cc55566ef58b8.exe" /TN BSpsfata099d /F3⤵
- Creates scheduled task(s)
PID:2820
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN BSpsfata099d > C:\Users\Admin\AppData\Local\Temp\PKdEj.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN BSpsfata099d4⤵PID:2708
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD502c7e9f7277e787d8da907e7c42bbd84
SHA1c34e3578f7b1063b4f16205af7a1d4980c691f47
SHA2566d5c5f88552c194667107476e255537de8a01c63a2d78dd8a8292709fe1468a3
SHA512b7a20a78749124015aa469c994246bbea1bec608a1350cc7e6ebb646aecb5f881421e299165de9d23cf2de27918254259e481452181edc3761f0f76d48841b8f
-
Filesize
1.5MB
MD5e2aeed813daca67eb7afa51c459cc451
SHA1b310f55399f20cea7c235f8af8fee550a4b30031
SHA2563b19f87db00e42ac955bde139273c08f4d15ba22d13c594ac09205a4a5882b80
SHA5120e4c7e9b80d9dd690a8711c6e1ff06297a346d3960640909e64d986aaec766c5234692861d6e13af6204e1e471daf88f37f80df1727efb9935ea09346879290f