Analysis
-
max time kernel
117s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/01/2024, 07:11
Behavioral task
behavioral1
Sample
76b626c79126a3366b0a7ace5bfdd89f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
76b626c79126a3366b0a7ace5bfdd89f.exe
Resource
win10v2004-20231215-en
General
-
Target
76b626c79126a3366b0a7ace5bfdd89f.exe
-
Size
3.9MB
-
MD5
76b626c79126a3366b0a7ace5bfdd89f
-
SHA1
1d50594e77504f9d71d26d857db9ebf8bc0d53e0
-
SHA256
99e240de93ee6491ee3095ba8fd480f4ea36f0e894e7f121b594b5b8c5c78d69
-
SHA512
5f36fa85fa894f3de5808f859e1328d0ac00fdb05d83955fc5acedb14abb5667d30f66465ed8e3921b3a95e059a5ebbdf61888118f4c34fe6f1d73d9e1d6fa19
-
SSDEEP
98304:T5AeVx41mKRlScakcibiqhMbMgOn7n0bcakcibiqhsEgxrBcakcibiqhMbMgOn7R:T5AeV+mKDSdlirybMgOnkdlirOdlirys
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2716 76b626c79126a3366b0a7ace5bfdd89f.exe -
Executes dropped EXE 1 IoCs
pid Process 2716 76b626c79126a3366b0a7ace5bfdd89f.exe -
Loads dropped DLL 1 IoCs
pid Process 1992 76b626c79126a3366b0a7ace5bfdd89f.exe -
resource yara_rule behavioral1/memory/1992-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000c0000000122dc-11.dat upx behavioral1/memory/1992-16-0x00000000236F0000-0x000000002394C000-memory.dmp upx behavioral1/files/0x000c0000000122dc-17.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2756 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 76b626c79126a3366b0a7ace5bfdd89f.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 76b626c79126a3366b0a7ace5bfdd89f.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 76b626c79126a3366b0a7ace5bfdd89f.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 76b626c79126a3366b0a7ace5bfdd89f.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1992 76b626c79126a3366b0a7ace5bfdd89f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1992 76b626c79126a3366b0a7ace5bfdd89f.exe 2716 76b626c79126a3366b0a7ace5bfdd89f.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2716 1992 76b626c79126a3366b0a7ace5bfdd89f.exe 29 PID 1992 wrote to memory of 2716 1992 76b626c79126a3366b0a7ace5bfdd89f.exe 29 PID 1992 wrote to memory of 2716 1992 76b626c79126a3366b0a7ace5bfdd89f.exe 29 PID 1992 wrote to memory of 2716 1992 76b626c79126a3366b0a7ace5bfdd89f.exe 29 PID 2716 wrote to memory of 2756 2716 76b626c79126a3366b0a7ace5bfdd89f.exe 30 PID 2716 wrote to memory of 2756 2716 76b626c79126a3366b0a7ace5bfdd89f.exe 30 PID 2716 wrote to memory of 2756 2716 76b626c79126a3366b0a7ace5bfdd89f.exe 30 PID 2716 wrote to memory of 2756 2716 76b626c79126a3366b0a7ace5bfdd89f.exe 30 PID 2716 wrote to memory of 2620 2716 76b626c79126a3366b0a7ace5bfdd89f.exe 32 PID 2716 wrote to memory of 2620 2716 76b626c79126a3366b0a7ace5bfdd89f.exe 32 PID 2716 wrote to memory of 2620 2716 76b626c79126a3366b0a7ace5bfdd89f.exe 32 PID 2716 wrote to memory of 2620 2716 76b626c79126a3366b0a7ace5bfdd89f.exe 32 PID 2620 wrote to memory of 2272 2620 cmd.exe 34 PID 2620 wrote to memory of 2272 2620 cmd.exe 34 PID 2620 wrote to memory of 2272 2620 cmd.exe 34 PID 2620 wrote to memory of 2272 2620 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\76b626c79126a3366b0a7ace5bfdd89f.exe"C:\Users\Admin\AppData\Local\Temp\76b626c79126a3366b0a7ace5bfdd89f.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\76b626c79126a3366b0a7ace5bfdd89f.exeC:\Users\Admin\AppData\Local\Temp\76b626c79126a3366b0a7ace5bfdd89f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\76b626c79126a3366b0a7ace5bfdd89f.exe" /TN MXmKXYLpa01b /F3⤵
- Creates scheduled task(s)
PID:2756
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN MXmKXYLpa01b > C:\Users\Admin\AppData\Local\Temp\GSEt4zjpj.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN MXmKXYLpa01b4⤵PID:2272
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD581d71906867ff3b810262ba309837acb
SHA1591bf223444c7084b94113b3098c5398177b7c6b
SHA256d27e80e90f1dcc89538cf0aa6f0180be1129afc43815bb11a60e8101954bb2a6
SHA512815900eee0a2a79fa0e6cadc9b168ff40b301269f4fb4184a6a44ef51e9bdf091c71173eda8e3379d3f0b8d0cd3bc01c1af092c87e39bdbf37497ee6d0bf81c1
-
Filesize
1KB
MD55fcd8d5893c01f1a5917be1df09fe03e
SHA1b56b6a8ab59b01927531668e8b7d2c9910b1d5fb
SHA256cebc74e53fcf76c18df9590c8c88718db9f11428b728e3d6d3a18627cdfe77e1
SHA5129302dde500d9797d7b52d2d5ddb167d85132f32c02950164fccf6ae1f3f8f5fe6655af124c5004e438b5c0c935789adcfe8252946edd55221fc0df97840090cb
-
Filesize
339KB
MD5035799589b76328465f37207f2eaffa6
SHA18c0d25a0e93524c484fe9b8da342e86306c494c6
SHA256855a0d1cd9256da41205b52bee053b1228f58e8dca60ca14acd412ba0bd0399f
SHA512c591656d420dc92864160df5b243390b789db5ba002f3bf4db1f29c481ec1fcb9002928c31243032384336248f89b6b92fe4b30b0295f65ffd23e01d335f220c