Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 02:15
Behavioral task
behavioral1
Sample
712cb641fcf96eb398b1f5aba7e1e678.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
712cb641fcf96eb398b1f5aba7e1e678.exe
Resource
win10v2004-20231215-en
General
-
Target
712cb641fcf96eb398b1f5aba7e1e678.exe
-
Size
3.9MB
-
MD5
712cb641fcf96eb398b1f5aba7e1e678
-
SHA1
b9af86de3bfb1fec9dff14dc1d90694ff8a0309b
-
SHA256
772394504df6c7f12ed9c7ba2990b6e0da6c8eee02c5902d1cc106750d6df2e5
-
SHA512
7dcb2e5e51f9d3019271c53da7030c26b87e5dd07b2d9d666ebbaf422d081d7612d0cebf3ecf190f39162cc02fb9ec01df78337303e0ab3ac74fa1b627d13b31
-
SSDEEP
98304:XgyCXeIGncakcibiqhXt1X+W6cakcibiqhfkqKre7jgcakcibiqhXt1X+W6cakcO:QyKbGndlirdfX+W6dlirpoSPgdlirdfF
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2120 712cb641fcf96eb398b1f5aba7e1e678.exe -
Executes dropped EXE 1 IoCs
pid Process 2120 712cb641fcf96eb398b1f5aba7e1e678.exe -
Loads dropped DLL 1 IoCs
pid Process 1984 712cb641fcf96eb398b1f5aba7e1e678.exe -
resource yara_rule behavioral1/memory/1984-4-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000800000000b529-11.dat upx behavioral1/memory/1984-16-0x0000000023590000-0x00000000237EC000-memory.dmp upx behavioral1/files/0x000800000000b529-17.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 940 schtasks.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 712cb641fcf96eb398b1f5aba7e1e678.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 030000000100000014000000a053375bfe84e8b748782c7cee15827a6af5a405140000000100000014000000142eb317b75856cbae500940e61faf9d8b14c2c6040000000100000010000000e829e65d7c4307d6fbc13c179e037a360f0000000100000020000000444ebd67bb83f8807b3921e938ac9178b882bd50aadb11231f044cf5f08df7ce190000000100000010000000f044424c506513d62804c04f719403f91800000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000001a05000030820516308202fea003020102021100912b084acf0c18a753f6d62e25a75f5a300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3230303930343030303030305a170d3235303931353136303030305a3032310b300906035504061302555331163014060355040a130d4c6574277320456e6372797074310b300906035504031302523330820122300d06092a864886f70d01010105000382010f003082010a0282010100bb021528ccf6a094d30f12ec8d5592c3f882f199a67a4288a75d26aab52bb9c54cb1af8e6bf975c8a3d70f4794145535578c9ea8a23919f5823c42a94e6ef53bc32edb8dc0b05cf35938e7edcf69f05a0b1bbec094242587fa3771b313e71cace19befdbe43b45524596a9c153ce34c852eeb5aeed8fde6070e2a554abb66d0e97a540346b2bd3bc66eb66347cfa6b8b8f572999f830175dba726ffb81c5add286583d17c7e709bbf12bf786dcc1da715dd446e3ccad25c188bc60677566b3f118f7a25ce653ff3a88b647a5ff1318ea9809773f9d53f9cf01e5f5a6701714af63a4ff99b3939ddc53a706fe48851da169ae2575bb13cc5203f5ed51a18bdb150203010001a382010830820104300e0603551d0f0101ff040403020186301d0603551d250416301406082b0601050507030206082b0601050507030130120603551d130101ff040830060101ff020100301d0603551d0e04160414142eb317b75856cbae500940e61faf9d8b14c2c6301f0603551d2304183016801479b459e67bb6e5e40173800888c81a58f6e99b6e303206082b0601050507010104263024302206082b060105050730028616687474703a2f2f78312e692e6c656e63722e6f72672f30270603551d1f0420301e301ca01aa0188616687474703a2f2f78312e632e6c656e63722e6f72672f30220603551d20041b30193008060667810c010201300d060b2b0601040182df13010101300d06092a864886f70d01010b0500038202010085ca4e473ea3f7854485bcd56778b29863ad754d1e963d336572542d81a0eac3edf820bf5fccb77000b76e3bf65e94dee4209fa6ef8bb203e7a2b5163c91ceb4ed3902e77c258a47e6656e3f46f4d9f0ce942bee54ce12bc8c274bb8c1982fa2afcd71914a08b7c8b8237b042d08f908573e83d904330a472178098227c32ac89bb9ce5cf264c8c0be79c04f8e6d440c5e92bb2ef78b10e1e81d4429db5920ed63b921f81226949357a01d6504c10a22ae100d4397a1181f7ee0e08637b55ab1bd30bf876e2b2aff214e1b05c3f51897f05eacc3a5b86af02ebc3b33b9ee4bdeccfce4af840b863fc0554336f668e136176a8e99d1ffa540a734b7c0d063393539756ef2ba76c89302e9a94b6c17ce0c02d9bd81fb9fb768d40665b3823d7753f88e7903ad0a3107752a43d8559772c4290ef7c45d4ec8ae468430d7f2855f18a179bbe75e708b07e18693c3b98fdc6171252aafdfed255052688b92dce5d6b5e3da7dd0876c842131ae82f5fbb9abc889173de14ce5380ef6bd2bbd968114ebd5db3d20a77e59d3e2f858f95bb848cdfe5c4f1629fe1e5523afc811b08dea7c9390172ffdaca20947463ff0e9b0b7ff284d6832d6675e1e69a393b8f59d8b2f0bd25243a66f3257654d3281df3853855d7e5d6629eab8dde495b5cdb5561242cdc44ec6253844506decce005518fee94964d44eca979cb45bc073a8abb847c2 712cb641fcf96eb398b1f5aba7e1e678.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 712cb641fcf96eb398b1f5aba7e1e678.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 712cb641fcf96eb398b1f5aba7e1e678.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1984 712cb641fcf96eb398b1f5aba7e1e678.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1984 712cb641fcf96eb398b1f5aba7e1e678.exe 2120 712cb641fcf96eb398b1f5aba7e1e678.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2120 1984 712cb641fcf96eb398b1f5aba7e1e678.exe 29 PID 1984 wrote to memory of 2120 1984 712cb641fcf96eb398b1f5aba7e1e678.exe 29 PID 1984 wrote to memory of 2120 1984 712cb641fcf96eb398b1f5aba7e1e678.exe 29 PID 1984 wrote to memory of 2120 1984 712cb641fcf96eb398b1f5aba7e1e678.exe 29 PID 2120 wrote to memory of 940 2120 712cb641fcf96eb398b1f5aba7e1e678.exe 30 PID 2120 wrote to memory of 940 2120 712cb641fcf96eb398b1f5aba7e1e678.exe 30 PID 2120 wrote to memory of 940 2120 712cb641fcf96eb398b1f5aba7e1e678.exe 30 PID 2120 wrote to memory of 940 2120 712cb641fcf96eb398b1f5aba7e1e678.exe 30 PID 2120 wrote to memory of 1456 2120 712cb641fcf96eb398b1f5aba7e1e678.exe 34 PID 2120 wrote to memory of 1456 2120 712cb641fcf96eb398b1f5aba7e1e678.exe 34 PID 2120 wrote to memory of 1456 2120 712cb641fcf96eb398b1f5aba7e1e678.exe 34 PID 2120 wrote to memory of 1456 2120 712cb641fcf96eb398b1f5aba7e1e678.exe 34 PID 1456 wrote to memory of 1872 1456 cmd.exe 33 PID 1456 wrote to memory of 1872 1456 cmd.exe 33 PID 1456 wrote to memory of 1872 1456 cmd.exe 33 PID 1456 wrote to memory of 1872 1456 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\712cb641fcf96eb398b1f5aba7e1e678.exe"C:\Users\Admin\AppData\Local\Temp\712cb641fcf96eb398b1f5aba7e1e678.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\712cb641fcf96eb398b1f5aba7e1e678.exeC:\Users\Admin\AppData\Local\Temp\712cb641fcf96eb398b1f5aba7e1e678.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\712cb641fcf96eb398b1f5aba7e1e678.exe" /TN U5Z8sQiHf24d /F3⤵
- Creates scheduled task(s)
PID:940
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN U5Z8sQiHf24d > C:\Users\Admin\AppData\Local\Temp\aUlyDc99L.xml3⤵
- Suspicious use of WriteProcessMemory
PID:1456
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN U5Z8sQiHf24d1⤵PID:1872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5ef789cffc447fee3682e46a0001b2774
SHA13fa6fc03445072759973eb38c978016a59f8e13e
SHA25664ddedce7b4d3c07477dd799389a7aacdbc3c976facba2d7b4290ef9cefb834f
SHA512141a1f5844fef9cff766dd75ca31951960a11c3b38127fdedd65248f7311556a81764fe43020e98101e635fc9b9e54a9739e14dfec0e9ab4324ae467623efeb1
-
Filesize
1KB
MD5d3f9ce12194abd8c6a9d2546db0d0cf6
SHA1b08a92ad2b8d15a3e18fab50fb9967e6c23ad31a
SHA25604967b742905c7718671bc98fa45ebd3b4000cec8cd11476cd11babaef03d26d
SHA5128f968f2888fc4e95b30b903777b6f3561bfae5cec908dad9194edd8c22045464ef514d012dc89cc952586b85ba358355f5e072a8a5e8d0acc249916776cac5e6
-
Filesize
799KB
MD5f5685d943e0de4d1bced21dcd3fd5db6
SHA1a6e32050e403d2d0eaf42ecbc67f96852a653119
SHA256ab77f0698d3ee99f38ad6a7a982e3f78957b4ebf8ff22c52f53d8a986b3d583f
SHA512c13c7de8441ae866f04908965a247e3bc92b530b6a59943c8725bddd798c83993b7c40f20a2786a6277c9dde2d4db5b7c44292f0f11f6c43faf9284dbb7e5175