Analysis
-
max time kernel
121s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04-02-2024 03:44
Behavioral task
behavioral1
Sample
8e217e067ac4818449d02f7d197ab3e8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8e217e067ac4818449d02f7d197ab3e8.exe
Resource
win10v2004-20231215-en
General
-
Target
8e217e067ac4818449d02f7d197ab3e8.exe
-
Size
1003KB
-
MD5
8e217e067ac4818449d02f7d197ab3e8
-
SHA1
91adb225954d463e52adc940dc9484d9de445ce4
-
SHA256
a2fb500e1192fc96ec53e97b2ea682b819c4c9bea84e2c6f28d719e1c7fd30a6
-
SHA512
f00450cd2227d65f35ca0ffc16d7c75bee84d6692676a3ad60456b3f7a20866a4c11037b0be297395dc06ed5a15686fb9c07066a5772505b51ef63ffc2992475
-
SSDEEP
24576:GDWLUQQAk8haas6RkBWUWn24Yv/W3ipx:GDWLUQdk8haas6RkBWU224YvVpx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2736 8e217e067ac4818449d02f7d197ab3e8.exe -
Executes dropped EXE 1 IoCs
pid Process 2736 8e217e067ac4818449d02f7d197ab3e8.exe -
Loads dropped DLL 1 IoCs
pid Process 1932 8e217e067ac4818449d02f7d197ab3e8.exe -
resource yara_rule behavioral1/memory/1932-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000b000000012267-11.dat upx behavioral1/memory/1932-16-0x0000000023040000-0x000000002329C000-memory.dmp upx behavioral1/memory/2736-18-0x0000000000400000-0x000000000065C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2688 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 8e217e067ac4818449d02f7d197ab3e8.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 8e217e067ac4818449d02f7d197ab3e8.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 8e217e067ac4818449d02f7d197ab3e8.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 8e217e067ac4818449d02f7d197ab3e8.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1932 8e217e067ac4818449d02f7d197ab3e8.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1932 8e217e067ac4818449d02f7d197ab3e8.exe 2736 8e217e067ac4818449d02f7d197ab3e8.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2736 1932 8e217e067ac4818449d02f7d197ab3e8.exe 28 PID 1932 wrote to memory of 2736 1932 8e217e067ac4818449d02f7d197ab3e8.exe 28 PID 1932 wrote to memory of 2736 1932 8e217e067ac4818449d02f7d197ab3e8.exe 28 PID 1932 wrote to memory of 2736 1932 8e217e067ac4818449d02f7d197ab3e8.exe 28 PID 2736 wrote to memory of 2688 2736 8e217e067ac4818449d02f7d197ab3e8.exe 29 PID 2736 wrote to memory of 2688 2736 8e217e067ac4818449d02f7d197ab3e8.exe 29 PID 2736 wrote to memory of 2688 2736 8e217e067ac4818449d02f7d197ab3e8.exe 29 PID 2736 wrote to memory of 2688 2736 8e217e067ac4818449d02f7d197ab3e8.exe 29 PID 2736 wrote to memory of 2992 2736 8e217e067ac4818449d02f7d197ab3e8.exe 31 PID 2736 wrote to memory of 2992 2736 8e217e067ac4818449d02f7d197ab3e8.exe 31 PID 2736 wrote to memory of 2992 2736 8e217e067ac4818449d02f7d197ab3e8.exe 31 PID 2736 wrote to memory of 2992 2736 8e217e067ac4818449d02f7d197ab3e8.exe 31 PID 2992 wrote to memory of 2720 2992 cmd.exe 33 PID 2992 wrote to memory of 2720 2992 cmd.exe 33 PID 2992 wrote to memory of 2720 2992 cmd.exe 33 PID 2992 wrote to memory of 2720 2992 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e217e067ac4818449d02f7d197ab3e8.exe"C:\Users\Admin\AppData\Local\Temp\8e217e067ac4818449d02f7d197ab3e8.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\8e217e067ac4818449d02f7d197ab3e8.exeC:\Users\Admin\AppData\Local\Temp\8e217e067ac4818449d02f7d197ab3e8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\8e217e067ac4818449d02f7d197ab3e8.exe" /TN x1iLRz9v069a /F3⤵
- Creates scheduled task(s)
PID:2688
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN x1iLRz9v069a > C:\Users\Admin\AppData\Local\Temp\mZortG.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN x1iLRz9v069a4⤵PID:2720
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5dcbce3490362732e1925efabb921bfb1
SHA13890d83877e5039ee9e21932db7d042edee46608
SHA25632062318e6f7236de15460881492773a854ae44875414a73afeb7531def7d78f
SHA51218f47d24cbd07f27d733a8444ab35c2c35cde0a8b0c2eda07575f0bd6f3d1710f36016e5e5e5eb854844a9b341b43599e5c836ad629e9638403f60e6b251cd28
-
Filesize
1003KB
MD5b665864dcba193ff9bc9288da7f0b49d
SHA1d407e77bf928ce4f085132f9cc1b3caf3b7ed361
SHA256a0d6a662b7d217fe4d135a723c6516023d5fc10578df3b2cabae2fe774e60be4
SHA51245761bd208e3d02094cf6fa442ef5e24077af02ff1218f18fbc47e34e9cf52dc400b8e76e4cb8584b3110dc87887c81429a1df3f3fbe068b7c8bc624a6459d81