Analysis
-
max time kernel
137s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 15:58
Behavioral task
behavioral1
Sample
730c002b00490245fd71bf9b522a72c1.exe
Resource
win7-20231129-en
General
-
Target
730c002b00490245fd71bf9b522a72c1.exe
-
Size
3.0MB
-
MD5
730c002b00490245fd71bf9b522a72c1
-
SHA1
d2ec0465e632dda58baba33baaa98ec19c98c442
-
SHA256
5abf8ed5e0a6f61ad3ca9e55e9fc36421188dc7fbdf65a5f7bf44dc40c7b4435
-
SHA512
1e7e0a3c80de47a0f065c75b5c3406d78b565823ce8c1dd11e4d95d5a797826e87f4cdb1a28406f4392346ba548c9ce5991ed7e8fe2fae71bca0ad206638a4ff
-
SSDEEP
49152:+IIOWJvSvy5o9ZxcakLPIXgdfHBL5WEMDBapcakLnx1Ng7Hg76gGD4cakLPIXgdM:+IIOaK65o9ZxcakTOSfx5WEMDBapcak1
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
730c002b00490245fd71bf9b522a72c1.exepid process 2556 730c002b00490245fd71bf9b522a72c1.exe -
Executes dropped EXE 1 IoCs
Processes:
730c002b00490245fd71bf9b522a72c1.exepid process 2556 730c002b00490245fd71bf9b522a72c1.exe -
Loads dropped DLL 1 IoCs
Processes:
730c002b00490245fd71bf9b522a72c1.exepid process 2848 730c002b00490245fd71bf9b522a72c1.exe -
Processes:
resource yara_rule behavioral1/memory/2848-0-0x0000000000400000-0x000000000065C000-memory.dmp upx \Users\Admin\AppData\Local\Temp\730c002b00490245fd71bf9b522a72c1.exe upx behavioral1/memory/2848-16-0x0000000023480000-0x00000000236DC000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\730c002b00490245fd71bf9b522a72c1.exe upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Processes:
730c002b00490245fd71bf9b522a72c1.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 730c002b00490245fd71bf9b522a72c1.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 730c002b00490245fd71bf9b522a72c1.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 730c002b00490245fd71bf9b522a72c1.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 730c002b00490245fd71bf9b522a72c1.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
730c002b00490245fd71bf9b522a72c1.exepid process 2848 730c002b00490245fd71bf9b522a72c1.exe -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
730c002b00490245fd71bf9b522a72c1.exe730c002b00490245fd71bf9b522a72c1.exepid process 2848 730c002b00490245fd71bf9b522a72c1.exe 2556 730c002b00490245fd71bf9b522a72c1.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
730c002b00490245fd71bf9b522a72c1.exe730c002b00490245fd71bf9b522a72c1.execmd.exedescription pid process target process PID 2848 wrote to memory of 2556 2848 730c002b00490245fd71bf9b522a72c1.exe 730c002b00490245fd71bf9b522a72c1.exe PID 2848 wrote to memory of 2556 2848 730c002b00490245fd71bf9b522a72c1.exe 730c002b00490245fd71bf9b522a72c1.exe PID 2848 wrote to memory of 2556 2848 730c002b00490245fd71bf9b522a72c1.exe 730c002b00490245fd71bf9b522a72c1.exe PID 2848 wrote to memory of 2556 2848 730c002b00490245fd71bf9b522a72c1.exe 730c002b00490245fd71bf9b522a72c1.exe PID 2556 wrote to memory of 2896 2556 730c002b00490245fd71bf9b522a72c1.exe schtasks.exe PID 2556 wrote to memory of 2896 2556 730c002b00490245fd71bf9b522a72c1.exe schtasks.exe PID 2556 wrote to memory of 2896 2556 730c002b00490245fd71bf9b522a72c1.exe schtasks.exe PID 2556 wrote to memory of 2896 2556 730c002b00490245fd71bf9b522a72c1.exe schtasks.exe PID 2556 wrote to memory of 2604 2556 730c002b00490245fd71bf9b522a72c1.exe cmd.exe PID 2556 wrote to memory of 2604 2556 730c002b00490245fd71bf9b522a72c1.exe cmd.exe PID 2556 wrote to memory of 2604 2556 730c002b00490245fd71bf9b522a72c1.exe cmd.exe PID 2556 wrote to memory of 2604 2556 730c002b00490245fd71bf9b522a72c1.exe cmd.exe PID 2604 wrote to memory of 2716 2604 cmd.exe schtasks.exe PID 2604 wrote to memory of 2716 2604 cmd.exe schtasks.exe PID 2604 wrote to memory of 2716 2604 cmd.exe schtasks.exe PID 2604 wrote to memory of 2716 2604 cmd.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\730c002b00490245fd71bf9b522a72c1.exe"C:\Users\Admin\AppData\Local\Temp\730c002b00490245fd71bf9b522a72c1.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\730c002b00490245fd71bf9b522a72c1.exeC:\Users\Admin\AppData\Local\Temp\730c002b00490245fd71bf9b522a72c1.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\730c002b00490245fd71bf9b522a72c1.exe" /TN 6ek6uOO9da42 /F3⤵
- Creates scheduled task(s)
PID:2896 -
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN 6ek6uOO9da42 > C:\Users\Admin\AppData\Local\Temp\ukun1.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2604
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN 6ek6uOO9da421⤵PID:2716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\730c002b00490245fd71bf9b522a72c1.exeFilesize
1.5MB
MD5f126b68febefce134495569346be482f
SHA1633e75825718ec8b56a957303fb2da9572faa5e4
SHA256083e6b61b3f521bfe3d1e7b4b596dd30a0766c96d9d237b9e5f64a5824b2c66a
SHA512f7b63a53e2e0affe1bdfc88aefef638f2e5c39d688b0e520150c24c3b1abb5239cb9766535f55bf6cc07c2ab143e1b11de6f412e2396938bd68b77d5007022c6
-
C:\Users\Admin\AppData\Local\Temp\ukun1.xmlFilesize
1KB
MD597b26cf9f0a4c1e987f3a9312f322d41
SHA137620f5135b6fee45defd5a3072ab97d2fc102ee
SHA2569123d9c77684657f8cedb911abe4ee16002824d7bd8eb001764c508887d98974
SHA51250ba4b6097c9c32155cf28321a8262834e10e68fd5eb1a9e5084634ebb638ac58280cb040bcb8737ca2dde75bac741b709d4c52aea1784a3b1db2e7520555066
-
\Users\Admin\AppData\Local\Temp\730c002b00490245fd71bf9b522a72c1.exeFilesize
1.6MB
MD5645f7c6cb9b298932b1fab8e9bfd9264
SHA10a537e9913e06062b9ef27ba7539aa1d3525669a
SHA2568fc237b5ba60b44ba95b97b6b15ba7e42667603e105e7157fd5f1da1b279f2e7
SHA5124cff9060a9b75a8c28b07a18e574c58c75f2e1b6e26dbc53c7590a2e98b4e77aec032799fe7eb0a3a015c2716c8c1beeeeb8befa9c090c709b29811dc8869100
-
memory/2556-19-0x0000000000400000-0x000000000065C000-memory.dmpFilesize
2.4MB
-
memory/2556-21-0x00000000002B0000-0x000000000032E000-memory.dmpFilesize
504KB
-
memory/2556-31-0x0000000000330000-0x000000000039B000-memory.dmpFilesize
428KB
-
memory/2556-26-0x0000000000400000-0x000000000045B000-memory.dmpFilesize
364KB
-
memory/2556-45-0x0000000000400000-0x000000000065C000-memory.dmpFilesize
2.4MB
-
memory/2848-16-0x0000000023480000-0x00000000236DC000-memory.dmpFilesize
2.4MB
-
memory/2848-1-0x0000000000400000-0x000000000046B000-memory.dmpFilesize
428KB
-
memory/2848-0-0x0000000000400000-0x000000000065C000-memory.dmpFilesize
2.4MB
-
memory/2848-15-0x0000000000400000-0x000000000046B000-memory.dmpFilesize
428KB
-
memory/2848-2-0x0000000022DE0000-0x0000000022E5E000-memory.dmpFilesize
504KB