Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28-01-2024 03:57
Behavioral task
behavioral1
Sample
7c15df615fc4a81a95275770fae617e0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7c15df615fc4a81a95275770fae617e0.exe
Resource
win10v2004-20231222-en
General
-
Target
7c15df615fc4a81a95275770fae617e0.exe
-
Size
1003KB
-
MD5
7c15df615fc4a81a95275770fae617e0
-
SHA1
13cbd26e8c5a18f85de135ef3e4d04e35cca41ee
-
SHA256
51fd2dd5db329fbdbcd6f791cc99d258dd021232e7d46bce851e4827cd31da98
-
SHA512
8f28419b113edf29c56f51ae73a54da3b8d39b8dee56e3c2809ba1e48d59c07f0ede4c9952e70f28d206aeb415472abeffc37089bb94052b22738c554a851835
-
SSDEEP
24576:WZ8CiFTQBeS+08QDQn1P/tUViftKGpwseMvvG:WZ8CmQBeS+08QEn1PFUViftKGysdH
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2680 7c15df615fc4a81a95275770fae617e0.exe -
Executes dropped EXE 1 IoCs
pid Process 2680 7c15df615fc4a81a95275770fae617e0.exe -
Loads dropped DLL 1 IoCs
pid Process 1744 7c15df615fc4a81a95275770fae617e0.exe -
resource yara_rule behavioral1/memory/1744-4-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x00080000000120dc-11.dat upx behavioral1/files/0x00080000000120dc-17.dat upx behavioral1/memory/1744-16-0x0000000022EC0000-0x000000002311C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2812 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 7c15df615fc4a81a95275770fae617e0.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 7c15df615fc4a81a95275770fae617e0.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 7c15df615fc4a81a95275770fae617e0.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 7c15df615fc4a81a95275770fae617e0.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1744 7c15df615fc4a81a95275770fae617e0.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1744 7c15df615fc4a81a95275770fae617e0.exe 2680 7c15df615fc4a81a95275770fae617e0.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1744 wrote to memory of 2680 1744 7c15df615fc4a81a95275770fae617e0.exe 29 PID 1744 wrote to memory of 2680 1744 7c15df615fc4a81a95275770fae617e0.exe 29 PID 1744 wrote to memory of 2680 1744 7c15df615fc4a81a95275770fae617e0.exe 29 PID 1744 wrote to memory of 2680 1744 7c15df615fc4a81a95275770fae617e0.exe 29 PID 2680 wrote to memory of 2812 2680 7c15df615fc4a81a95275770fae617e0.exe 30 PID 2680 wrote to memory of 2812 2680 7c15df615fc4a81a95275770fae617e0.exe 30 PID 2680 wrote to memory of 2812 2680 7c15df615fc4a81a95275770fae617e0.exe 30 PID 2680 wrote to memory of 2812 2680 7c15df615fc4a81a95275770fae617e0.exe 30 PID 2680 wrote to memory of 2472 2680 7c15df615fc4a81a95275770fae617e0.exe 32 PID 2680 wrote to memory of 2472 2680 7c15df615fc4a81a95275770fae617e0.exe 32 PID 2680 wrote to memory of 2472 2680 7c15df615fc4a81a95275770fae617e0.exe 32 PID 2680 wrote to memory of 2472 2680 7c15df615fc4a81a95275770fae617e0.exe 32 PID 2472 wrote to memory of 2908 2472 cmd.exe 33 PID 2472 wrote to memory of 2908 2472 cmd.exe 33 PID 2472 wrote to memory of 2908 2472 cmd.exe 33 PID 2472 wrote to memory of 2908 2472 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c15df615fc4a81a95275770fae617e0.exe"C:\Users\Admin\AppData\Local\Temp\7c15df615fc4a81a95275770fae617e0.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\7c15df615fc4a81a95275770fae617e0.exeC:\Users\Admin\AppData\Local\Temp\7c15df615fc4a81a95275770fae617e0.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\7c15df615fc4a81a95275770fae617e0.exe" /TN uhTCmbCqd877 /F3⤵
- Creates scheduled task(s)
PID:2812
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN uhTCmbCqd877 > C:\Users\Admin\AppData\Local\Temp\rsKpO8.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN uhTCmbCqd8774⤵PID:2908
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144KB
MD5247b6a64196c9143a78d1d3facf6f42d
SHA182bc309fd1d05b6c3db699327b0a6671e971365f
SHA256116265cc40081695a3bfdc0761fe5cf678d147238803859a1fb5e908c2ca672b
SHA512d7ef9500d3f587e4b0d0405d4a923189747b27badfecbf40f19b73cdc18ce0989604e04d1d96552135c5a3c087c3e63ff8d0f6c84d10f98c5a7c7bcb84a8eded
-
Filesize
1KB
MD55b4ed994b77e077c47686775c68ca77d
SHA11505e9acf5a1361eba23be19c74616438d062916
SHA256ef462bedac2ffb1c5a5e39d0c26fa857c3be478267bb0596919b44d68aac67dd
SHA5129cb22274aa1f0f777c28585c08dbc101cd7babfc482d57047d8661732a14dd35c2808491e440d4a6a75421e1d0cee7c241f4df2385500c8a335d0d2c29903886
-
Filesize
250KB
MD59fd2dd36f753d0ec941240212004df4e
SHA10cece76778dbe7ada7f34c076ca2e3a81103a173
SHA2567a214c1c025a414ecb91ee7ba24bd1f2ce6e237bad29a9fd449093313c60b251
SHA5124ff78edbf4b3a986fc064131b84f45b4afcf0833a29e37077ca882b2f53e789d615ec4f7048788ae855778f87840503cdb44d9d4aa4c3fd22588671e02152991