Analysis
-
max time kernel
132s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
24-02-2024 11:45
Static task
static1
Behavioral task
behavioral1
Sample
a1ca271b07d591b1cf9fba663d65b29d.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
a1ca271b07d591b1cf9fba663d65b29d.exe
Resource
win10v2004-20240221-en
General
-
Target
a1ca271b07d591b1cf9fba663d65b29d.exe
-
Size
28KB
-
MD5
a1ca271b07d591b1cf9fba663d65b29d
-
SHA1
311de07d6700fce937a4bc40d832e225d0314278
-
SHA256
2a01e128c520c2fb21457bb3459b1656b524cf75b202fa360119fd78c2071c1c
-
SHA512
ac785ceeab69752c514b636672a1df8e12ef4eda3672e2915fa8acec187c59640dcd1ab5f841d8014e87edc71628513e4595c3cbc65f09a833539018a13d16a1
-
SSDEEP
768:Mz0woDlJgtvK8JdkGlab+pmn7oZLL59c1DJB+UmguTt:NJluty8LxlaqwoJL59YDJB+RgU
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3060 services32.exe 2500 sihost32.exe -
Loads dropped DLL 2 IoCs
pid Process 2040 a1ca271b07d591b1cf9fba663d65b29d.exe 3060 services32.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 raw.githubusercontent.com 7 raw.githubusercontent.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2660 schtasks.exe 2496 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 services32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 04000000010000001000000079e4a9840d7d3a96d7c04fe2434c892e0f0000000100000014000000b34ddd372ed92e8f2abfbb9e20a9d31f204f194b090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030814000000010000001400000003de503556d14cbb66f0a3e21b1bc397b23dd1550b00000001000000120000004400690067006900430065007200740000001d000000010000001000000059779e39e21a2e3dfced6857ed5c5fd9030000000100000014000000a8985d3a65e5e5c4b2d7d66d40c6dd2fb19c54361900000001000000100000000f3a0527d242de2dc98e5cfcb1e991ee2000000001000000b3030000308203af30820297a0030201020210083be056904246b1a1756ac95991c74a300d06092a864886f70d01010505003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100e23be11172dea8a4d3a357aa50a28f0b7790c9a2a5ee12ce965b010920cc0193a74e30b753f743c46900579de28d22dd870640008109cece1b83bfdfcd3b7146e2d666c705b37627168f7b9e1e957deeb748a308dad6af7a0c3906657f4a5d1fbc17f8abbeee28d7747f7a78995985686e5c23324bbf4ec0e85a6de370bf7710bffc01f685d9a844105832a97518d5d1a2be47e2276af49a33f84908608bd45fb43a84bfa1aa4a4c7d3ecf4f5f6c765ea04b37919edc22e66dce141a8e6acbfecdb3146417c75b299e32bff2eefad30b42d4abb74132da0cd4eff881d5bb8d583fb51be84928a270da3104ddf7b216f24c0a4e07a8ed4a3d5eb57fa390c3af270203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041403de503556d14cbb66f0a3e21b1bc397b23dd155301f0603551d2304183016801403de503556d14cbb66f0a3e21b1bc397b23dd155300d06092a864886f70d01010505000382010100cb9c37aa4813120afadd449c4f52b0f4dfae04f5797908a32418fc4b2b84c02db9d5c7fef4c11f58cbb86d9c7a74e79829ab11b5e370a0a1cd4c8899938c9170e2ab0f1cbe93a9ff63d5e40760d3a3bf9d5b09f1d58ee353f48e63fa3fa7dbb466df6266d6d16e418df22db5ea774a9f9d58e22b59c04023ed2d2882453e7954922698e08048a837eff0d6796016deace80ecd6eac4417382f49dae1453e2ab93653cf3a5006f72ee8c457496c612118d504ad783c2c3a806ba7ebaf1514e9d889c1b9386ce2916c8aff64b977255730c01b24a3e1dce9df477cb5b424080530ec2dbd0bbf45bf50b9a9f3eb980112adc888c698345f8d0a3cc6e9d595956dde services32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2040 a1ca271b07d591b1cf9fba663d65b29d.exe 3060 services32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2040 a1ca271b07d591b1cf9fba663d65b29d.exe Token: SeDebugPrivilege 3060 services32.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2584 2040 a1ca271b07d591b1cf9fba663d65b29d.exe 28 PID 2040 wrote to memory of 2584 2040 a1ca271b07d591b1cf9fba663d65b29d.exe 28 PID 2040 wrote to memory of 2584 2040 a1ca271b07d591b1cf9fba663d65b29d.exe 28 PID 2584 wrote to memory of 2660 2584 cmd.exe 30 PID 2584 wrote to memory of 2660 2584 cmd.exe 30 PID 2584 wrote to memory of 2660 2584 cmd.exe 30 PID 2040 wrote to memory of 3060 2040 a1ca271b07d591b1cf9fba663d65b29d.exe 31 PID 2040 wrote to memory of 3060 2040 a1ca271b07d591b1cf9fba663d65b29d.exe 31 PID 2040 wrote to memory of 3060 2040 a1ca271b07d591b1cf9fba663d65b29d.exe 31 PID 3060 wrote to memory of 2468 3060 services32.exe 32 PID 3060 wrote to memory of 2468 3060 services32.exe 32 PID 3060 wrote to memory of 2468 3060 services32.exe 32 PID 3060 wrote to memory of 2500 3060 services32.exe 34 PID 3060 wrote to memory of 2500 3060 services32.exe 34 PID 3060 wrote to memory of 2500 3060 services32.exe 34 PID 2468 wrote to memory of 2496 2468 cmd.exe 35 PID 2468 wrote to memory of 2496 2468 cmd.exe 35 PID 2468 wrote to memory of 2496 2468 cmd.exe 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1ca271b07d591b1cf9fba663d65b29d.exe"C:\Users\Admin\AppData\Local\Temp\a1ca271b07d591b1cf9fba663d65b29d.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Users\Admin\AppData\Local\Temp\services32.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Users\Admin\AppData\Local\Temp\services32.exe"'3⤵
- Creates scheduled task(s)
PID:2660
-
-
-
C:\Users\Admin\AppData\Local\Temp\services32.exe"C:\Users\Admin\AppData\Local\Temp\services32.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Users\Admin\AppData\Local\Temp\services32.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Users\Admin\AppData\Local\Temp\services32.exe"'4⤵
- Creates scheduled task(s)
PID:2496
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe"3⤵
- Executes dropped EXE
PID:2500
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5a1ca271b07d591b1cf9fba663d65b29d
SHA1311de07d6700fce937a4bc40d832e225d0314278
SHA2562a01e128c520c2fb21457bb3459b1656b524cf75b202fa360119fd78c2071c1c
SHA512ac785ceeab69752c514b636672a1df8e12ef4eda3672e2915fa8acec187c59640dcd1ab5f841d8014e87edc71628513e4595c3cbc65f09a833539018a13d16a1
-
Filesize
8KB
MD557ec34d5fcb003c5c21a9ba6aa205527
SHA1047aed9ea55f9e5a99a592234c5e02f6b6edcc5e
SHA256b2ab78d1a6c489d9c3e9e4fa800f7e4afbee2073be9dd661e7c5bc3b817e50fc
SHA512b8df10263baab055b965ee68ce2172c2914894c2bfea4be2d01a68ee0544f92dfcdd369282e04c96599c6b05cc2cebe1b332986c516291c08f9ffb7d5c8461ba