Analysis
-
max time kernel
138s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 19:12
Behavioral task
behavioral1
Sample
99eb18edf31400a73ce44411e6a83a3a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
99eb18edf31400a73ce44411e6a83a3a.exe
Resource
win10v2004-20231215-en
General
-
Target
99eb18edf31400a73ce44411e6a83a3a.exe
-
Size
2.0MB
-
MD5
99eb18edf31400a73ce44411e6a83a3a
-
SHA1
6f8481a42d67ffe4e329961d2eb605c7be50cb56
-
SHA256
6dda5ddd8f7bf1dce59233cc9f6636cbe8bbcd74bcf94be8f11acbd5896b1b44
-
SHA512
69d96b8b9778418096cb249d29219dcd0f3c463bc3b92a16c3e9a7ac960c0447afa7dc6dba7a83b827c321fcee90965a25e9e39dffc7e68d83e70c35c7086301
-
SSDEEP
49152:IgVQ2IDJ0OilvAG4DjLypEkcQi3uF2OQ1vwQlIv9PoBwkc7jDBO0vAG4DjLypEki:IgVQdDJviloGLpEkcQi+FlQ1vnCv1oiD
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3044 99eb18edf31400a73ce44411e6a83a3a.exe -
Executes dropped EXE 1 IoCs
pid Process 3044 99eb18edf31400a73ce44411e6a83a3a.exe -
Loads dropped DLL 1 IoCs
pid Process 2872 99eb18edf31400a73ce44411e6a83a3a.exe -
resource yara_rule behavioral1/memory/2872-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000a0000000133a9-11.dat upx behavioral1/memory/2872-15-0x0000000023250000-0x00000000234AC000-memory.dmp upx behavioral1/memory/3044-18-0x0000000000400000-0x000000000065C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2708 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 99eb18edf31400a73ce44411e6a83a3a.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 99eb18edf31400a73ce44411e6a83a3a.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 99eb18edf31400a73ce44411e6a83a3a.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 99eb18edf31400a73ce44411e6a83a3a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2872 99eb18edf31400a73ce44411e6a83a3a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2872 99eb18edf31400a73ce44411e6a83a3a.exe 3044 99eb18edf31400a73ce44411e6a83a3a.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2872 wrote to memory of 3044 2872 99eb18edf31400a73ce44411e6a83a3a.exe 29 PID 2872 wrote to memory of 3044 2872 99eb18edf31400a73ce44411e6a83a3a.exe 29 PID 2872 wrote to memory of 3044 2872 99eb18edf31400a73ce44411e6a83a3a.exe 29 PID 2872 wrote to memory of 3044 2872 99eb18edf31400a73ce44411e6a83a3a.exe 29 PID 3044 wrote to memory of 2708 3044 99eb18edf31400a73ce44411e6a83a3a.exe 30 PID 3044 wrote to memory of 2708 3044 99eb18edf31400a73ce44411e6a83a3a.exe 30 PID 3044 wrote to memory of 2708 3044 99eb18edf31400a73ce44411e6a83a3a.exe 30 PID 3044 wrote to memory of 2708 3044 99eb18edf31400a73ce44411e6a83a3a.exe 30 PID 3044 wrote to memory of 2716 3044 99eb18edf31400a73ce44411e6a83a3a.exe 32 PID 3044 wrote to memory of 2716 3044 99eb18edf31400a73ce44411e6a83a3a.exe 32 PID 3044 wrote to memory of 2716 3044 99eb18edf31400a73ce44411e6a83a3a.exe 32 PID 3044 wrote to memory of 2716 3044 99eb18edf31400a73ce44411e6a83a3a.exe 32 PID 2716 wrote to memory of 2696 2716 cmd.exe 34 PID 2716 wrote to memory of 2696 2716 cmd.exe 34 PID 2716 wrote to memory of 2696 2716 cmd.exe 34 PID 2716 wrote to memory of 2696 2716 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\99eb18edf31400a73ce44411e6a83a3a.exe"C:\Users\Admin\AppData\Local\Temp\99eb18edf31400a73ce44411e6a83a3a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\99eb18edf31400a73ce44411e6a83a3a.exeC:\Users\Admin\AppData\Local\Temp\99eb18edf31400a73ce44411e6a83a3a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\99eb18edf31400a73ce44411e6a83a3a.exe" /TN qm2lmOfce5f6 /F3⤵
- Creates scheduled task(s)
PID:2708
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN qm2lmOfce5f6 > C:\Users\Admin\AppData\Local\Temp\FgBts.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN qm2lmOfce5f64⤵PID:2696
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a5abcf01f01ad700d7a6358d137b05a5
SHA1ab7585350044ac5549c739a730ba455401920e19
SHA256a0501b97203c82a44723681642089395e04d106c67117a93715ab737888de172
SHA512bcd923d394baad041631635c0d686208f6fbb23251a6a718a429c7cb1093c79f7f641e3c34beeec5d08cb48d855382667001d0aa7e6f989d66cbd4f9fc6f8f26
-
Filesize
2.0MB
MD5dbb4f27d1a9232aa7f5e468561c247aa
SHA1a2b99a8fc46cca42d6c982b75b9a62f9c470fd8e
SHA256be3647e7e372235505c3221f8775576bcc99e383806f62cb5d71e786cbf5830e
SHA512be30d804de48929c6c0912c39fea3d6a0177edad2a0429e3085bc2b23513c6aba80ee5c15c788cd501fbcfed4968db71458cfb67b38a7a9fa0cf07493192a6f3