Analysis
-
max time kernel
137s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12/02/2024, 12:48
Behavioral task
behavioral1
Sample
97302a4018355bc712b7dde443b8319a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
97302a4018355bc712b7dde443b8319a.exe
Resource
win10v2004-20231215-en
General
-
Target
97302a4018355bc712b7dde443b8319a.exe
-
Size
3.9MB
-
MD5
97302a4018355bc712b7dde443b8319a
-
SHA1
17f1f65f6124f6ce078eca902727e52252863aa5
-
SHA256
23873ccec34decfe261716022afd565b0d03ad4e8ce847789740d05768ebb317
-
SHA512
569d27e7fd84fb12b24b50d8518e52fa3dfd7da4d2d9eef2dda1318bdc70c34f066bde8d458c340260140f95904a4412c92f206e8c4f62864fb49123388b75ef
-
SSDEEP
98304:PbXdTMlyDdKrUr0wQyZ2lAqoZzAQ9qoFGDdKrUr0wQyaQCR1HoG2UVxDdKrUr0we:Ldwlypvr0Z6zAQEpvr0rXZkUVxpvr0Z8
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2948 97302a4018355bc712b7dde443b8319a.exe -
Executes dropped EXE 1 IoCs
pid Process 2948 97302a4018355bc712b7dde443b8319a.exe -
Loads dropped DLL 1 IoCs
pid Process 2088 97302a4018355bc712b7dde443b8319a.exe -
resource yara_rule behavioral1/memory/2088-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000900000001447e-11.dat upx behavioral1/memory/2088-16-0x0000000023870000-0x0000000023ACC000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2592 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 97302a4018355bc712b7dde443b8319a.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 97302a4018355bc712b7dde443b8319a.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 97302a4018355bc712b7dde443b8319a.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 97302a4018355bc712b7dde443b8319a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2088 97302a4018355bc712b7dde443b8319a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2088 97302a4018355bc712b7dde443b8319a.exe 2948 97302a4018355bc712b7dde443b8319a.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2948 2088 97302a4018355bc712b7dde443b8319a.exe 29 PID 2088 wrote to memory of 2948 2088 97302a4018355bc712b7dde443b8319a.exe 29 PID 2088 wrote to memory of 2948 2088 97302a4018355bc712b7dde443b8319a.exe 29 PID 2088 wrote to memory of 2948 2088 97302a4018355bc712b7dde443b8319a.exe 29 PID 2948 wrote to memory of 2592 2948 97302a4018355bc712b7dde443b8319a.exe 30 PID 2948 wrote to memory of 2592 2948 97302a4018355bc712b7dde443b8319a.exe 30 PID 2948 wrote to memory of 2592 2948 97302a4018355bc712b7dde443b8319a.exe 30 PID 2948 wrote to memory of 2592 2948 97302a4018355bc712b7dde443b8319a.exe 30 PID 2948 wrote to memory of 2900 2948 97302a4018355bc712b7dde443b8319a.exe 32 PID 2948 wrote to memory of 2900 2948 97302a4018355bc712b7dde443b8319a.exe 32 PID 2948 wrote to memory of 2900 2948 97302a4018355bc712b7dde443b8319a.exe 32 PID 2948 wrote to memory of 2900 2948 97302a4018355bc712b7dde443b8319a.exe 32 PID 2900 wrote to memory of 2912 2900 cmd.exe 34 PID 2900 wrote to memory of 2912 2900 cmd.exe 34 PID 2900 wrote to memory of 2912 2900 cmd.exe 34 PID 2900 wrote to memory of 2912 2900 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\97302a4018355bc712b7dde443b8319a.exe"C:\Users\Admin\AppData\Local\Temp\97302a4018355bc712b7dde443b8319a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\97302a4018355bc712b7dde443b8319a.exeC:\Users\Admin\AppData\Local\Temp\97302a4018355bc712b7dde443b8319a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\97302a4018355bc712b7dde443b8319a.exe" /TN 6ek6uOO9da42 /F3⤵
- Creates scheduled task(s)
PID:2592
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN 6ek6uOO9da42 > C:\Users\Admin\AppData\Local\Temp\5nstd.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN 6ek6uOO9da424⤵PID:2912
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56119f07ca6c97ac3a42321bd8e235303
SHA17e7ac9d6fc2200a334e8a62193934338fdf8a141
SHA256128d2a8093ab2aee5d6d55c13f26a26f6915c0f7c972f9225f19f2cf71d22d98
SHA512a09db7482f10088bec9514352921c051ed299942760f2f7ea315b514634fbff5d2b39c34ea0674fb0f0a1b769a33cee9a8344283a0256ffeb2f82fef3df3c923
-
Filesize
3.9MB
MD5cad81d25f5e7376ad74050c1bbb2311b
SHA1effa8a685051a083a078f7ba7077c9be65293449
SHA25680e7a722750527191fed51e4c8ae71139adeef918129ca0e8275dbf0804d3fa7
SHA512f3456ef2cc3e4afdcea63c96455742e42cf7071db6448451ad2e5af3c07c255b10ffde0394ec382ad0d760324411f1f761b2524afc90921e871e5bfd8735ae72