Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 12:13
Behavioral task
behavioral1
Sample
8c4b738e99c2888159fc9edd304c23a0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8c4b738e99c2888159fc9edd304c23a0.exe
Resource
win10v2004-20231215-en
General
-
Target
8c4b738e99c2888159fc9edd304c23a0.exe
-
Size
1.5MB
-
MD5
8c4b738e99c2888159fc9edd304c23a0
-
SHA1
9d361e46b227bafda7fc1d87d018dcb8ee884048
-
SHA256
f5e5c4211d4dc83685a841a35e855855025926490e9702c7f01fba5f628aa5a7
-
SHA512
8be854f830211ca282151b1c4957abaf40616055234794ba5e30f07a4764bf4b69371ade30e93c96d3baf620d45267adda13e11e1b1ed881f0baa61f3139142d
-
SSDEEP
24576:58PPAdkSAbxrdr790+NYBUGvCcjukL2Lfyy5dv5xFwgpYFPlB5+PcjukL2Y:58PodLAbxrdr50+N8UGvCcakLVy5dv5C
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2668 8c4b738e99c2888159fc9edd304c23a0.exe -
Executes dropped EXE 1 IoCs
pid Process 2668 8c4b738e99c2888159fc9edd304c23a0.exe -
Loads dropped DLL 1 IoCs
pid Process 816 8c4b738e99c2888159fc9edd304c23a0.exe -
resource yara_rule behavioral1/memory/816-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000c000000012329-11.dat upx behavioral1/files/0x000c000000012329-15.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2696 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 8c4b738e99c2888159fc9edd304c23a0.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 8c4b738e99c2888159fc9edd304c23a0.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 8c4b738e99c2888159fc9edd304c23a0.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 8c4b738e99c2888159fc9edd304c23a0.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 816 8c4b738e99c2888159fc9edd304c23a0.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 816 8c4b738e99c2888159fc9edd304c23a0.exe 2668 8c4b738e99c2888159fc9edd304c23a0.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 816 wrote to memory of 2668 816 8c4b738e99c2888159fc9edd304c23a0.exe 29 PID 816 wrote to memory of 2668 816 8c4b738e99c2888159fc9edd304c23a0.exe 29 PID 816 wrote to memory of 2668 816 8c4b738e99c2888159fc9edd304c23a0.exe 29 PID 816 wrote to memory of 2668 816 8c4b738e99c2888159fc9edd304c23a0.exe 29 PID 2668 wrote to memory of 2696 2668 8c4b738e99c2888159fc9edd304c23a0.exe 31 PID 2668 wrote to memory of 2696 2668 8c4b738e99c2888159fc9edd304c23a0.exe 31 PID 2668 wrote to memory of 2696 2668 8c4b738e99c2888159fc9edd304c23a0.exe 31 PID 2668 wrote to memory of 2696 2668 8c4b738e99c2888159fc9edd304c23a0.exe 31 PID 2668 wrote to memory of 2680 2668 8c4b738e99c2888159fc9edd304c23a0.exe 33 PID 2668 wrote to memory of 2680 2668 8c4b738e99c2888159fc9edd304c23a0.exe 33 PID 2668 wrote to memory of 2680 2668 8c4b738e99c2888159fc9edd304c23a0.exe 33 PID 2668 wrote to memory of 2680 2668 8c4b738e99c2888159fc9edd304c23a0.exe 33 PID 2680 wrote to memory of 2388 2680 cmd.exe 34 PID 2680 wrote to memory of 2388 2680 cmd.exe 34 PID 2680 wrote to memory of 2388 2680 cmd.exe 34 PID 2680 wrote to memory of 2388 2680 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c4b738e99c2888159fc9edd304c23a0.exe"C:\Users\Admin\AppData\Local\Temp\8c4b738e99c2888159fc9edd304c23a0.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Users\Admin\AppData\Local\Temp\8c4b738e99c2888159fc9edd304c23a0.exeC:\Users\Admin\AppData\Local\Temp\8c4b738e99c2888159fc9edd304c23a0.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\8c4b738e99c2888159fc9edd304c23a0.exe" /TN U5Z8sQiHf24d /F3⤵
- Creates scheduled task(s)
PID:2696
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN U5Z8sQiHf24d > C:\Users\Admin\AppData\Local\Temp\cNK4MWE.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN U5Z8sQiHf24d4⤵PID:2388
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
500KB
MD5d9eaa4b8cea16031d7ccfd2504ea559c
SHA1e2d81e7d58d7d49fefe1beb91d061fcfcd9644b5
SHA256985b745f452cab4dcdd017ed94ff00dc7b46fffa1d0f517e21c360dcbd01ded1
SHA51256f68776d52d03d5720ccb44e44c1eea2f8eb9bcba0583eb84613839bf5e5ef88607fd11578619e8dc692c636955d915b7cf6b0e05f7598f8cf96d67259070c1
-
Filesize
1KB
MD5c00f4bd082fb78233c64fcff6e2f3e1b
SHA1d4ee0100b2b3ec1049ec8f452f470920cbdbe300
SHA2569387d981e448d2386b485ab8f86fe87b025aaddf48f526c247949042b79fd9f2
SHA5128e7f555e8d40eb9d525e50810cb6f3f63b5396d5a48363bff9c6135fb01dbcfc537ee041e1218ff23a388733d6a2b59b93806139a10f1ddd0cd7cb8fbd2c7586
-
Filesize
520KB
MD5e561c07c1980225e233d5d78ae3bc689
SHA18814a1ced9ed63ce2cb4ad5ddde248f3c7317b3f
SHA256bdfa19db6e7aef1f69d865b70230b45abde901fa825c43a249219deead82ab2b
SHA512fbe4b6f1f8ef34f2dc185bf6ccf64160daca5b87de17f133544283d42d970d64812470f3562c6706da1808f6b95cf43831b6eab751642c121a7076183bf27433