Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-02-2024 18:09
Behavioral task
behavioral1
Sample
a2696c965faa862d1f4675bf01bd1050.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a2696c965faa862d1f4675bf01bd1050.exe
Resource
win10v2004-20240221-en
General
-
Target
a2696c965faa862d1f4675bf01bd1050.exe
-
Size
3.9MB
-
MD5
a2696c965faa862d1f4675bf01bd1050
-
SHA1
c9f64c9b068e69604122d97e0eda73a33faa1c9e
-
SHA256
65399374203d2bef83c8843614018d3e8ed0f1b5e2fdf12fb0d78018b5b401a5
-
SHA512
f4ee42a8b5e84d9b6642dd37207473a932234827e703ab052b0c4884b641067f41d061c24b966739444f13f03a3550aa5c564111b598d19fd50ba9f3a846853c
-
SSDEEP
98304:TO59MpBrALiOcakcibiqhMbMgOn7n0bcakcibiqhySnJ1UO6L+cakcibiqhMbMgo:VrKiOdlirybMgOnkdlirgSDy+dlirybo
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2548 a2696c965faa862d1f4675bf01bd1050.exe -
Executes dropped EXE 1 IoCs
pid Process 2548 a2696c965faa862d1f4675bf01bd1050.exe -
Loads dropped DLL 1 IoCs
pid Process 2504 a2696c965faa862d1f4675bf01bd1050.exe -
resource yara_rule behavioral1/memory/2504-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000e00000001221f-11.dat upx behavioral1/files/0x000e00000001221f-15.dat upx behavioral1/memory/2548-19-0x0000000000400000-0x000000000065C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2564 schtasks.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 a2696c965faa862d1f4675bf01bd1050.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 a2696c965faa862d1f4675bf01bd1050.exe Set value (data) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 a2696c965faa862d1f4675bf01bd1050.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 a2696c965faa862d1f4675bf01bd1050.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2504 a2696c965faa862d1f4675bf01bd1050.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2504 a2696c965faa862d1f4675bf01bd1050.exe 2548 a2696c965faa862d1f4675bf01bd1050.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2548 2504 a2696c965faa862d1f4675bf01bd1050.exe 29 PID 2504 wrote to memory of 2548 2504 a2696c965faa862d1f4675bf01bd1050.exe 29 PID 2504 wrote to memory of 2548 2504 a2696c965faa862d1f4675bf01bd1050.exe 29 PID 2504 wrote to memory of 2548 2504 a2696c965faa862d1f4675bf01bd1050.exe 29 PID 2548 wrote to memory of 2564 2548 a2696c965faa862d1f4675bf01bd1050.exe 30 PID 2548 wrote to memory of 2564 2548 a2696c965faa862d1f4675bf01bd1050.exe 30 PID 2548 wrote to memory of 2564 2548 a2696c965faa862d1f4675bf01bd1050.exe 30 PID 2548 wrote to memory of 2564 2548 a2696c965faa862d1f4675bf01bd1050.exe 30 PID 2548 wrote to memory of 2108 2548 a2696c965faa862d1f4675bf01bd1050.exe 32 PID 2548 wrote to memory of 2108 2548 a2696c965faa862d1f4675bf01bd1050.exe 32 PID 2548 wrote to memory of 2108 2548 a2696c965faa862d1f4675bf01bd1050.exe 32 PID 2548 wrote to memory of 2108 2548 a2696c965faa862d1f4675bf01bd1050.exe 32 PID 2108 wrote to memory of 2676 2108 cmd.exe 34 PID 2108 wrote to memory of 2676 2108 cmd.exe 34 PID 2108 wrote to memory of 2676 2108 cmd.exe 34 PID 2108 wrote to memory of 2676 2108 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2696c965faa862d1f4675bf01bd1050.exe"C:\Users\Admin\AppData\Local\Temp\a2696c965faa862d1f4675bf01bd1050.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\a2696c965faa862d1f4675bf01bd1050.exeC:\Users\Admin\AppData\Local\Temp\a2696c965faa862d1f4675bf01bd1050.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\a2696c965faa862d1f4675bf01bd1050.exe" /TN uoFCMKY16031 /F3⤵
- Creates scheduled task(s)
PID:2564
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN uoFCMKY16031 > C:\Users\Admin\AppData\Local\Temp\P3RLeANg.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN uoFCMKY160314⤵PID:2676
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5df0a573d61fcd68bc3c0b065edca5b19
SHA1ba458bb02333635ed633e1e22ddeff694271ca3e
SHA25686b94bfe89041619109bfe35f3f22ae104a118a39f37a0e4cf548df78e6918c0
SHA512074fa91e0db54a0bd304f883ec436ee20026d669d0458cf7396fa2e44dc262abb6d8bf52448d7811d8c706382326dba24db271135d9c247f423d5eb54a811f96
-
Filesize
2.6MB
MD5a512439a49b939409c61797a8b48e070
SHA1f632e9b165dc91fd7de9b5449d670cac22e5e84b
SHA25683e696a983688cc50a8ff96f501575547eadc36d4e23f2f4d75e6b1e8d05e4a8
SHA512c7a4576e9670f2dc73106319554beb49bb7b969397c705e145ba20dfa423b47a4adf3c2495c0fcd9442e7788f2c048fc7b8417840eabf968f5a9d5bee69e97df
-
Filesize
2.4MB
MD562f55f6ed30da84b21d92f4300ce79cd
SHA1336fdc015f37bc7e7c2b436ab0bd81942fccedd0
SHA2566a6fdbe76f0bef9d1a6ec719c59ac77d662a41d12479b8c1e611bd8af43b4197
SHA512a49979aba60d8cf03f44e2a9878b6f0bd0966b63cc4b950819b3fbb35a788fd8f236ee9af601f4f80813ef43745d3da56f9493f5c44368c723eb1fd48261a74f