Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/02/2024, 12:51
Behavioral task
behavioral1
Sample
973116769343d7b82072fd01dc35f499.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
973116769343d7b82072fd01dc35f499.exe
Resource
win10v2004-20231222-en
General
-
Target
973116769343d7b82072fd01dc35f499.exe
-
Size
1.6MB
-
MD5
973116769343d7b82072fd01dc35f499
-
SHA1
d181407e608f47a3dd8098a036c562e563d25101
-
SHA256
dcd481f815388a19b5386266560ee262f7f3536c12113ede5f1e61e3e29c03ca
-
SHA512
d89e36c95c4b6d12a707185bd93bf4bfbb13bde66cf1769780ecc37c0bc6bd8dd19b63fd54ff2f590ad7d5891cfeaca0ce647e70c5fd35272819338df4b50585
-
SSDEEP
49152:nrgFTFbGNKcakLz02NolDrx7vFLwmCs1YcakLz0O:nrGTFbGNKcakc2NolDFBLwIYcakcO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2276 973116769343d7b82072fd01dc35f499.exe -
Executes dropped EXE 1 IoCs
pid Process 2276 973116769343d7b82072fd01dc35f499.exe -
Loads dropped DLL 1 IoCs
pid Process 2892 973116769343d7b82072fd01dc35f499.exe -
resource yara_rule behavioral1/memory/2892-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000b000000012731-16.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2884 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 973116769343d7b82072fd01dc35f499.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 973116769343d7b82072fd01dc35f499.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 973116769343d7b82072fd01dc35f499.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 030000000100000014000000a053375bfe84e8b748782c7cee15827a6af5a405140000000100000014000000142eb317b75856cbae500940e61faf9d8b14c2c6040000000100000010000000e829e65d7c4307d6fbc13c179e037a360f0000000100000020000000444ebd67bb83f8807b3921e938ac9178b882bd50aadb11231f044cf5f08df7ce190000000100000010000000f044424c506513d62804c04f719403f91800000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000001a05000030820516308202fea003020102021100912b084acf0c18a753f6d62e25a75f5a300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3230303930343030303030305a170d3235303931353136303030305a3032310b300906035504061302555331163014060355040a130d4c6574277320456e6372797074310b300906035504031302523330820122300d06092a864886f70d01010105000382010f003082010a0282010100bb021528ccf6a094d30f12ec8d5592c3f882f199a67a4288a75d26aab52bb9c54cb1af8e6bf975c8a3d70f4794145535578c9ea8a23919f5823c42a94e6ef53bc32edb8dc0b05cf35938e7edcf69f05a0b1bbec094242587fa3771b313e71cace19befdbe43b45524596a9c153ce34c852eeb5aeed8fde6070e2a554abb66d0e97a540346b2bd3bc66eb66347cfa6b8b8f572999f830175dba726ffb81c5add286583d17c7e709bbf12bf786dcc1da715dd446e3ccad25c188bc60677566b3f118f7a25ce653ff3a88b647a5ff1318ea9809773f9d53f9cf01e5f5a6701714af63a4ff99b3939ddc53a706fe48851da169ae2575bb13cc5203f5ed51a18bdb150203010001a382010830820104300e0603551d0f0101ff040403020186301d0603551d250416301406082b0601050507030206082b0601050507030130120603551d130101ff040830060101ff020100301d0603551d0e04160414142eb317b75856cbae500940e61faf9d8b14c2c6301f0603551d2304183016801479b459e67bb6e5e40173800888c81a58f6e99b6e303206082b0601050507010104263024302206082b060105050730028616687474703a2f2f78312e692e6c656e63722e6f72672f30270603551d1f0420301e301ca01aa0188616687474703a2f2f78312e632e6c656e63722e6f72672f30220603551d20041b30193008060667810c010201300d060b2b0601040182df13010101300d06092a864886f70d01010b0500038202010085ca4e473ea3f7854485bcd56778b29863ad754d1e963d336572542d81a0eac3edf820bf5fccb77000b76e3bf65e94dee4209fa6ef8bb203e7a2b5163c91ceb4ed3902e77c258a47e6656e3f46f4d9f0ce942bee54ce12bc8c274bb8c1982fa2afcd71914a08b7c8b8237b042d08f908573e83d904330a472178098227c32ac89bb9ce5cf264c8c0be79c04f8e6d440c5e92bb2ef78b10e1e81d4429db5920ed63b921f81226949357a01d6504c10a22ae100d4397a1181f7ee0e08637b55ab1bd30bf876e2b2aff214e1b05c3f51897f05eacc3a5b86af02ebc3b33b9ee4bdeccfce4af840b863fc0554336f668e136176a8e99d1ffa540a734b7c0d063393539756ef2ba76c89302e9a94b6c17ce0c02d9bd81fb9fb768d40665b3823d7753f88e7903ad0a3107752a43d8559772c4290ef7c45d4ec8ae468430d7f2855f18a179bbe75e708b07e18693c3b98fdc6171252aafdfed255052688b92dce5d6b5e3da7dd0876c842131ae82f5fbb9abc889173de14ce5380ef6bd2bbd968114ebd5db3d20a77e59d3e2f858f95bb848cdfe5c4f1629fe1e5523afc811b08dea7c9390172ffdaca20947463ff0e9b0b7ff284d6832d6675e1e69a393b8f59d8b2f0bd25243a66f3257654d3281df3853855d7e5d6629eab8dde495b5cdb5561242cdc44ec6253844506decce005518fee94964d44eca979cb45bc073a8abb847c2 973116769343d7b82072fd01dc35f499.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2892 973116769343d7b82072fd01dc35f499.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2892 973116769343d7b82072fd01dc35f499.exe 2276 973116769343d7b82072fd01dc35f499.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2892 wrote to memory of 2276 2892 973116769343d7b82072fd01dc35f499.exe 29 PID 2892 wrote to memory of 2276 2892 973116769343d7b82072fd01dc35f499.exe 29 PID 2892 wrote to memory of 2276 2892 973116769343d7b82072fd01dc35f499.exe 29 PID 2892 wrote to memory of 2276 2892 973116769343d7b82072fd01dc35f499.exe 29 PID 2276 wrote to memory of 2884 2276 973116769343d7b82072fd01dc35f499.exe 30 PID 2276 wrote to memory of 2884 2276 973116769343d7b82072fd01dc35f499.exe 30 PID 2276 wrote to memory of 2884 2276 973116769343d7b82072fd01dc35f499.exe 30 PID 2276 wrote to memory of 2884 2276 973116769343d7b82072fd01dc35f499.exe 30 PID 2276 wrote to memory of 2712 2276 973116769343d7b82072fd01dc35f499.exe 32 PID 2276 wrote to memory of 2712 2276 973116769343d7b82072fd01dc35f499.exe 32 PID 2276 wrote to memory of 2712 2276 973116769343d7b82072fd01dc35f499.exe 32 PID 2276 wrote to memory of 2712 2276 973116769343d7b82072fd01dc35f499.exe 32 PID 2712 wrote to memory of 3040 2712 cmd.exe 34 PID 2712 wrote to memory of 3040 2712 cmd.exe 34 PID 2712 wrote to memory of 3040 2712 cmd.exe 34 PID 2712 wrote to memory of 3040 2712 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\973116769343d7b82072fd01dc35f499.exe"C:\Users\Admin\AppData\Local\Temp\973116769343d7b82072fd01dc35f499.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\973116769343d7b82072fd01dc35f499.exeC:\Users\Admin\AppData\Local\Temp\973116769343d7b82072fd01dc35f499.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\973116769343d7b82072fd01dc35f499.exe" /TN x1iLRz9v069a /F3⤵
- Creates scheduled task(s)
PID:2884
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN x1iLRz9v069a > C:\Users\Admin\AppData\Local\Temp\CgxCy.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN x1iLRz9v069a4⤵PID:3040
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5dc408af71a462bf77c5164d0787db332
SHA102cdeaf6d187bae4a3a12b4227152eaf7b4bd8db
SHA256b5be02c3540f41ff7fd5d6c1000324698ccb8e22833786f900c533fa515c4a9c
SHA512ec003eccc65ee66b9d27c2471f49c2d7668e7ca6d4b7a8afdd5b532a6960ea62403c6f8632ad429c87a99d51972a70b475a6109830e5231e22c2c347882c40bc
-
Filesize
1KB
MD544d60063398cf19895b1d3032522d2df
SHA13a3459db0c2b8d5c626b3adb995cbccf93508aef
SHA256cff90a08f4478ce1a6a3eb4300fb99010e1c70c82015856a4de0d4bca3e5411e
SHA512d2cc280e88536b5b910646eb75f44986014e6e0bb9b85d4645e6dce25d907ac9ad2c4431164b0b93afcf94a861c6fdfb28a24a32da35d911faf15223d47d577d