Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
27/01/2024, 21:48
Behavioral task
behavioral1
Sample
7b5dae7efac792aa43a242f4d18bf0f5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7b5dae7efac792aa43a242f4d18bf0f5.exe
Resource
win10v2004-20231215-en
General
-
Target
7b5dae7efac792aa43a242f4d18bf0f5.exe
-
Size
3.9MB
-
MD5
7b5dae7efac792aa43a242f4d18bf0f5
-
SHA1
6e192ed5bdce7155d12e1d428526b76e01835ef7
-
SHA256
48c0df0903ff96741f16f71342198b92e49ae40a5a88be11ca3e99815bcc1ad5
-
SHA512
44542f5cb83b38404cee98f5b878a74abed5cd33359a95f3a8d0785a81954c030d543410cce80d0703102c4fa5cdeca0220c3055a1041418129a6e1539a13e60
-
SSDEEP
98304:47J7I3EjMdbx2jncakcibiqhMbMgOn7n0bcakcibiqhiBMUFMcakcibiqhMbMgO1:47J7QEjMRxmdlirybMgOnkdlirPUedlQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2704 7b5dae7efac792aa43a242f4d18bf0f5.exe -
Executes dropped EXE 1 IoCs
pid Process 2704 7b5dae7efac792aa43a242f4d18bf0f5.exe -
Loads dropped DLL 1 IoCs
pid Process 2280 7b5dae7efac792aa43a242f4d18bf0f5.exe -
resource yara_rule behavioral1/memory/2280-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000a000000012243-17.dat upx behavioral1/memory/2704-18-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000a000000012243-11.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2444 schtasks.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 7b5dae7efac792aa43a242f4d18bf0f5.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 7b5dae7efac792aa43a242f4d18bf0f5.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 7b5dae7efac792aa43a242f4d18bf0f5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 7b5dae7efac792aa43a242f4d18bf0f5.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2280 7b5dae7efac792aa43a242f4d18bf0f5.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2280 7b5dae7efac792aa43a242f4d18bf0f5.exe 2704 7b5dae7efac792aa43a242f4d18bf0f5.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2704 2280 7b5dae7efac792aa43a242f4d18bf0f5.exe 29 PID 2280 wrote to memory of 2704 2280 7b5dae7efac792aa43a242f4d18bf0f5.exe 29 PID 2280 wrote to memory of 2704 2280 7b5dae7efac792aa43a242f4d18bf0f5.exe 29 PID 2280 wrote to memory of 2704 2280 7b5dae7efac792aa43a242f4d18bf0f5.exe 29 PID 2704 wrote to memory of 2444 2704 7b5dae7efac792aa43a242f4d18bf0f5.exe 30 PID 2704 wrote to memory of 2444 2704 7b5dae7efac792aa43a242f4d18bf0f5.exe 30 PID 2704 wrote to memory of 2444 2704 7b5dae7efac792aa43a242f4d18bf0f5.exe 30 PID 2704 wrote to memory of 2444 2704 7b5dae7efac792aa43a242f4d18bf0f5.exe 30 PID 2704 wrote to memory of 2428 2704 7b5dae7efac792aa43a242f4d18bf0f5.exe 32 PID 2704 wrote to memory of 2428 2704 7b5dae7efac792aa43a242f4d18bf0f5.exe 32 PID 2704 wrote to memory of 2428 2704 7b5dae7efac792aa43a242f4d18bf0f5.exe 32 PID 2704 wrote to memory of 2428 2704 7b5dae7efac792aa43a242f4d18bf0f5.exe 32 PID 2428 wrote to memory of 2876 2428 cmd.exe 34 PID 2428 wrote to memory of 2876 2428 cmd.exe 34 PID 2428 wrote to memory of 2876 2428 cmd.exe 34 PID 2428 wrote to memory of 2876 2428 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b5dae7efac792aa43a242f4d18bf0f5.exe"C:\Users\Admin\AppData\Local\Temp\7b5dae7efac792aa43a242f4d18bf0f5.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\7b5dae7efac792aa43a242f4d18bf0f5.exeC:\Users\Admin\AppData\Local\Temp\7b5dae7efac792aa43a242f4d18bf0f5.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\7b5dae7efac792aa43a242f4d18bf0f5.exe" /TN BSpsfata099d /F3⤵
- Creates scheduled task(s)
PID:2444
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN BSpsfata099d > C:\Users\Admin\AppData\Local\Temp\ZSt0f.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN BSpsfata099d4⤵PID:2876
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD50a8ac08403d351c69789dbab98bca121
SHA1af68aa9e797d4beb6eb62d859b81444eb6c056e4
SHA25656c2b72298a7ae8c0e161fbd99421acf89ee1f4bb729a328117e78683053407e
SHA5129ec44992de16a74e19659853af9ee00b6fb1c4440f1a6be6b44102285ddcd159a11224a7681857e902043df0adf117c1522ad854025305f5e6172abbd4e12b49
-
Filesize
1KB
MD5ea6d82cd37ef01004bf29d8a76f9d7a2
SHA167c7170cc837888cd4c7e6e7a2160396fa1d0ff3
SHA25624966e8691401c08a9ae920b515ef8fff92a0b9e621eda67829313a711d24d93
SHA512569a5fc0367cedd2d49ff46e43fac2fc9135c6dcc8d8b902edfa9ff98fe7e118064dd0a9e162980f91e5d06ef6e03ab395391f2ea996707aae4888dcc7371e1f
-
Filesize
1.7MB
MD55832157ffabd6410f8967c6ee201b70d
SHA14db2d4bbf04d4b896c0dac0db41aa9851a3cf262
SHA25632cb74dd0c43a447fb8c68c4c14695515a751783db133ab0c2c9ac7201021f77
SHA512854bc457c0cd765608c65161601ea5b87df0c61d0ebaf407b9cde8799b5414d49185cc7f20ee2a931eb153cddb68141e45b8755571e84a7a02654b5579318b0c