Analysis
-
max time kernel
139s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-01-2024 22:16
Behavioral task
behavioral1
Sample
72fd2bfa312661381e26d6897d968985.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
72fd2bfa312661381e26d6897d968985.exe
Resource
win10v2004-20231215-en
General
-
Target
72fd2bfa312661381e26d6897d968985.exe
-
Size
2.0MB
-
MD5
72fd2bfa312661381e26d6897d968985
-
SHA1
9b2e6efc409d11f4ddc0b26bb81018321e7b9440
-
SHA256
255e0f2b0f8f69297a6066ad21425392b1cd7b87dcb80809b1dc0fb52c824e66
-
SHA512
07ed67a88edbbe36c2d09f0417285e5b48d22416aa775301bc9d95beb4b8ed485907245bfbdbaea72e7441145ef5069d3e524fb46942efbc93ee83395ae4e30c
-
SSDEEP
49152:Aw1yqciMe8cakLz0ibq6yqhGco8cG0d3ucakLz0ibq6yqh:AwgqciMe8cakcibiqhGccFd3ucakcibJ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3068 72fd2bfa312661381e26d6897d968985.exe -
Executes dropped EXE 1 IoCs
pid Process 3068 72fd2bfa312661381e26d6897d968985.exe -
Loads dropped DLL 1 IoCs
pid Process 1996 72fd2bfa312661381e26d6897d968985.exe -
resource yara_rule behavioral1/memory/1996-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000a000000012243-15.dat upx behavioral1/memory/3068-19-0x0000000000400000-0x000000000065C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2664 schtasks.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 72fd2bfa312661381e26d6897d968985.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 72fd2bfa312661381e26d6897d968985.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 72fd2bfa312661381e26d6897d968985.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 72fd2bfa312661381e26d6897d968985.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1996 72fd2bfa312661381e26d6897d968985.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1996 72fd2bfa312661381e26d6897d968985.exe 3068 72fd2bfa312661381e26d6897d968985.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1996 wrote to memory of 3068 1996 72fd2bfa312661381e26d6897d968985.exe 29 PID 1996 wrote to memory of 3068 1996 72fd2bfa312661381e26d6897d968985.exe 29 PID 1996 wrote to memory of 3068 1996 72fd2bfa312661381e26d6897d968985.exe 29 PID 1996 wrote to memory of 3068 1996 72fd2bfa312661381e26d6897d968985.exe 29 PID 3068 wrote to memory of 2664 3068 72fd2bfa312661381e26d6897d968985.exe 30 PID 3068 wrote to memory of 2664 3068 72fd2bfa312661381e26d6897d968985.exe 30 PID 3068 wrote to memory of 2664 3068 72fd2bfa312661381e26d6897d968985.exe 30 PID 3068 wrote to memory of 2664 3068 72fd2bfa312661381e26d6897d968985.exe 30 PID 3068 wrote to memory of 2776 3068 72fd2bfa312661381e26d6897d968985.exe 32 PID 3068 wrote to memory of 2776 3068 72fd2bfa312661381e26d6897d968985.exe 32 PID 3068 wrote to memory of 2776 3068 72fd2bfa312661381e26d6897d968985.exe 32 PID 3068 wrote to memory of 2776 3068 72fd2bfa312661381e26d6897d968985.exe 32 PID 2776 wrote to memory of 2752 2776 cmd.exe 34 PID 2776 wrote to memory of 2752 2776 cmd.exe 34 PID 2776 wrote to memory of 2752 2776 cmd.exe 34 PID 2776 wrote to memory of 2752 2776 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\72fd2bfa312661381e26d6897d968985.exe"C:\Users\Admin\AppData\Local\Temp\72fd2bfa312661381e26d6897d968985.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\72fd2bfa312661381e26d6897d968985.exeC:\Users\Admin\AppData\Local\Temp\72fd2bfa312661381e26d6897d968985.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\72fd2bfa312661381e26d6897d968985.exe" /TN uhTCmbCqd877 /F3⤵
- Creates scheduled task(s)
PID:2664
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN uhTCmbCqd877 > C:\Users\Admin\AppData\Local\Temp\Eqy3s.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN uhTCmbCqd8774⤵PID:2752
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5ae4810b6825aafba33618981adea7f84
SHA18eb26eebd143b21a4356ee4867bdf05b3829b151
SHA25682cc282bb7c650f2d35a6b98a6215fc7bdbfae48403e04f7ac157be1888d9214
SHA51298909eb93cf3ee055bf23f4975c72bde43a1878e9c80feede4500984b801d0e4ffd7c74804de6e7197f815c9790c7e76c35ea5e1b90b73e61cff374ba48833c6
-
Filesize
1KB
MD50f1cebe9c2b94f2940b6a7836a011806
SHA1f6bd57dd183da0c66d5d2949eae24a7a80e59196
SHA2566a5143e7279a176e2a69c3d665fc001e850e5a021a361ddd20736001fc411e40
SHA512a8062923364cf3badd657f0ff83cd5209c1bfe4533f99dcd9b48fffab2f7dfdc7ae6065a24deab5f8533bf755f5c008c2e6e1fec42819fbed2fbf136273dbd57