Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-02-2024 00:02
Behavioral task
behavioral1
Sample
ad31d03c68d0ea459d6c80b092ef2504.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ad31d03c68d0ea459d6c80b092ef2504.exe
Resource
win10v2004-20240226-en
General
-
Target
ad31d03c68d0ea459d6c80b092ef2504.exe
-
Size
3.2MB
-
MD5
ad31d03c68d0ea459d6c80b092ef2504
-
SHA1
59bb1dc52d170314c4f8e9bd219fcb9b204c0238
-
SHA256
52d0561b2c0ac69da78155864aee7a148f3b914b90e0ae226e41b9ff1fec961b
-
SHA512
ab2536ad5cdd3987f9e17d449686c708e2512acbf034f0808c4cf627e9235a04c6515cb4d47c37613b48d70febd7514f956603f3ef7ef66dbd675cdf20b89f9e
-
SSDEEP
98304:4JTWbi7VcakcmzU581lcakcwUrHLofycakcmzU581lcakcO:4J4mVdlmg587dlwqkfydlmg587dlO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2080 ad31d03c68d0ea459d6c80b092ef2504.exe -
Executes dropped EXE 1 IoCs
pid Process 2080 ad31d03c68d0ea459d6c80b092ef2504.exe -
Loads dropped DLL 1 IoCs
pid Process 1280 ad31d03c68d0ea459d6c80b092ef2504.exe -
resource yara_rule behavioral1/memory/1280-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x0010000000012248-11.dat upx behavioral1/memory/1280-16-0x0000000023510000-0x000000002376C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2628 schtasks.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 ad31d03c68d0ea459d6c80b092ef2504.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 ad31d03c68d0ea459d6c80b092ef2504.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 030000000100000014000000a053375bfe84e8b748782c7cee15827a6af5a405140000000100000014000000142eb317b75856cbae500940e61faf9d8b14c2c6040000000100000010000000e829e65d7c4307d6fbc13c179e037a360f0000000100000020000000444ebd67bb83f8807b3921e938ac9178b882bd50aadb11231f044cf5f08df7ce190000000100000010000000f044424c506513d62804c04f719403f91800000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000001a05000030820516308202fea003020102021100912b084acf0c18a753f6d62e25a75f5a300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3230303930343030303030305a170d3235303931353136303030305a3032310b300906035504061302555331163014060355040a130d4c6574277320456e6372797074310b300906035504031302523330820122300d06092a864886f70d01010105000382010f003082010a0282010100bb021528ccf6a094d30f12ec8d5592c3f882f199a67a4288a75d26aab52bb9c54cb1af8e6bf975c8a3d70f4794145535578c9ea8a23919f5823c42a94e6ef53bc32edb8dc0b05cf35938e7edcf69f05a0b1bbec094242587fa3771b313e71cace19befdbe43b45524596a9c153ce34c852eeb5aeed8fde6070e2a554abb66d0e97a540346b2bd3bc66eb66347cfa6b8b8f572999f830175dba726ffb81c5add286583d17c7e709bbf12bf786dcc1da715dd446e3ccad25c188bc60677566b3f118f7a25ce653ff3a88b647a5ff1318ea9809773f9d53f9cf01e5f5a6701714af63a4ff99b3939ddc53a706fe48851da169ae2575bb13cc5203f5ed51a18bdb150203010001a382010830820104300e0603551d0f0101ff040403020186301d0603551d250416301406082b0601050507030206082b0601050507030130120603551d130101ff040830060101ff020100301d0603551d0e04160414142eb317b75856cbae500940e61faf9d8b14c2c6301f0603551d2304183016801479b459e67bb6e5e40173800888c81a58f6e99b6e303206082b0601050507010104263024302206082b060105050730028616687474703a2f2f78312e692e6c656e63722e6f72672f30270603551d1f0420301e301ca01aa0188616687474703a2f2f78312e632e6c656e63722e6f72672f30220603551d20041b30193008060667810c010201300d060b2b0601040182df13010101300d06092a864886f70d01010b0500038202010085ca4e473ea3f7854485bcd56778b29863ad754d1e963d336572542d81a0eac3edf820bf5fccb77000b76e3bf65e94dee4209fa6ef8bb203e7a2b5163c91ceb4ed3902e77c258a47e6656e3f46f4d9f0ce942bee54ce12bc8c274bb8c1982fa2afcd71914a08b7c8b8237b042d08f908573e83d904330a472178098227c32ac89bb9ce5cf264c8c0be79c04f8e6d440c5e92bb2ef78b10e1e81d4429db5920ed63b921f81226949357a01d6504c10a22ae100d4397a1181f7ee0e08637b55ab1bd30bf876e2b2aff214e1b05c3f51897f05eacc3a5b86af02ebc3b33b9ee4bdeccfce4af840b863fc0554336f668e136176a8e99d1ffa540a734b7c0d063393539756ef2ba76c89302e9a94b6c17ce0c02d9bd81fb9fb768d40665b3823d7753f88e7903ad0a3107752a43d8559772c4290ef7c45d4ec8ae468430d7f2855f18a179bbe75e708b07e18693c3b98fdc6171252aafdfed255052688b92dce5d6b5e3da7dd0876c842131ae82f5fbb9abc889173de14ce5380ef6bd2bbd968114ebd5db3d20a77e59d3e2f858f95bb848cdfe5c4f1629fe1e5523afc811b08dea7c9390172ffdaca20947463ff0e9b0b7ff284d6832d6675e1e69a393b8f59d8b2f0bd25243a66f3257654d3281df3853855d7e5d6629eab8dde495b5cdb5561242cdc44ec6253844506decce005518fee94964d44eca979cb45bc073a8abb847c2 ad31d03c68d0ea459d6c80b092ef2504.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 ad31d03c68d0ea459d6c80b092ef2504.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1280 ad31d03c68d0ea459d6c80b092ef2504.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1280 ad31d03c68d0ea459d6c80b092ef2504.exe 2080 ad31d03c68d0ea459d6c80b092ef2504.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1280 wrote to memory of 2080 1280 ad31d03c68d0ea459d6c80b092ef2504.exe 29 PID 1280 wrote to memory of 2080 1280 ad31d03c68d0ea459d6c80b092ef2504.exe 29 PID 1280 wrote to memory of 2080 1280 ad31d03c68d0ea459d6c80b092ef2504.exe 29 PID 1280 wrote to memory of 2080 1280 ad31d03c68d0ea459d6c80b092ef2504.exe 29 PID 2080 wrote to memory of 2628 2080 ad31d03c68d0ea459d6c80b092ef2504.exe 30 PID 2080 wrote to memory of 2628 2080 ad31d03c68d0ea459d6c80b092ef2504.exe 30 PID 2080 wrote to memory of 2628 2080 ad31d03c68d0ea459d6c80b092ef2504.exe 30 PID 2080 wrote to memory of 2628 2080 ad31d03c68d0ea459d6c80b092ef2504.exe 30 PID 2080 wrote to memory of 2568 2080 ad31d03c68d0ea459d6c80b092ef2504.exe 32 PID 2080 wrote to memory of 2568 2080 ad31d03c68d0ea459d6c80b092ef2504.exe 32 PID 2080 wrote to memory of 2568 2080 ad31d03c68d0ea459d6c80b092ef2504.exe 32 PID 2080 wrote to memory of 2568 2080 ad31d03c68d0ea459d6c80b092ef2504.exe 32 PID 2568 wrote to memory of 2100 2568 cmd.exe 34 PID 2568 wrote to memory of 2100 2568 cmd.exe 34 PID 2568 wrote to memory of 2100 2568 cmd.exe 34 PID 2568 wrote to memory of 2100 2568 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad31d03c68d0ea459d6c80b092ef2504.exe"C:\Users\Admin\AppData\Local\Temp\ad31d03c68d0ea459d6c80b092ef2504.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\ad31d03c68d0ea459d6c80b092ef2504.exeC:\Users\Admin\AppData\Local\Temp\ad31d03c68d0ea459d6c80b092ef2504.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\ad31d03c68d0ea459d6c80b092ef2504.exe" /TN ZBrUCVBB2555 /F3⤵
- Creates scheduled task(s)
PID:2628
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN ZBrUCVBB2555 > C:\Users\Admin\AppData\Local\Temp\PO1PcP6uQ.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN ZBrUCVBB25554⤵PID:2100
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD533a55f80d1db6fcb3d8cc49fb153458b
SHA1f30f30eac3e24b4e8630c70780552c44d2c6b37d
SHA25607f335da39c18137b4ed9dc34b7f8e005171782698dc9743c86200349c271280
SHA512438c5c66aef5e113c747f3a79b70096df3a082e92a3b1a62912aaa5b49a5b221ad581b6b4187edb32bf118a2520bb29e1c32ceaedf7a2baa2c08c825d9b4d618
-
Filesize
3.2MB
MD5679b45c321178c4f441312c1c8d2efe1
SHA1920c127be7e7283c1db0b5363314208b2a6f6115
SHA2566f4165ad15a419528436a798e6b90d1be9d2f90caec9549b315504f41b6359ca
SHA512c3835c9889b7483ec3b4824df69591accb04df7fae341fd1dfbb1d7cf055310f24588981afba71947ab40df6134e8599cff8d5f004409bfcbd4cbf54dc9a314c