Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-03-2024 20:23
Behavioral task
behavioral1
Sample
b992414646e5a0f6a91f52679856021d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b992414646e5a0f6a91f52679856021d.exe
Resource
win10v2004-20240226-en
General
-
Target
b992414646e5a0f6a91f52679856021d.exe
-
Size
1003KB
-
MD5
b992414646e5a0f6a91f52679856021d
-
SHA1
33cf184d43e0e1928039337e13d0852a3c141b6a
-
SHA256
bb4263506fa55306816165a27540512d14c4bce2f4849c3017b9c8a6cc8d80db
-
SHA512
a167bf45d204b59cd96d25514cdd529c56f6d9a01f40f5df86e4febb1d846f1a00dbbc12f5b6127e63e213ca170b289e2ed85cd990e1827da31d1ec17f531401
-
SSDEEP
24576:UtlbotKqn4ESdeRi+an9tZcH5f+64JRWFULCD+:Uf8toEmeU+i9tZcN+9zWFULG+
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3056 b992414646e5a0f6a91f52679856021d.exe -
Executes dropped EXE 1 IoCs
pid Process 3056 b992414646e5a0f6a91f52679856021d.exe -
Loads dropped DLL 1 IoCs
pid Process 2808 b992414646e5a0f6a91f52679856021d.exe -
resource yara_rule behavioral1/memory/2808-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000d00000001224c-11.dat upx behavioral1/memory/2808-16-0x0000000023090000-0x00000000232EC000-memory.dmp upx behavioral1/files/0x000d00000001224c-17.dat upx behavioral1/memory/3056-18-0x0000000000400000-0x000000000065C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2560 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 b992414646e5a0f6a91f52679856021d.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 b992414646e5a0f6a91f52679856021d.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 b992414646e5a0f6a91f52679856021d.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 b992414646e5a0f6a91f52679856021d.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2808 b992414646e5a0f6a91f52679856021d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2808 b992414646e5a0f6a91f52679856021d.exe 3056 b992414646e5a0f6a91f52679856021d.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2808 wrote to memory of 3056 2808 b992414646e5a0f6a91f52679856021d.exe 29 PID 2808 wrote to memory of 3056 2808 b992414646e5a0f6a91f52679856021d.exe 29 PID 2808 wrote to memory of 3056 2808 b992414646e5a0f6a91f52679856021d.exe 29 PID 2808 wrote to memory of 3056 2808 b992414646e5a0f6a91f52679856021d.exe 29 PID 3056 wrote to memory of 2560 3056 b992414646e5a0f6a91f52679856021d.exe 30 PID 3056 wrote to memory of 2560 3056 b992414646e5a0f6a91f52679856021d.exe 30 PID 3056 wrote to memory of 2560 3056 b992414646e5a0f6a91f52679856021d.exe 30 PID 3056 wrote to memory of 2560 3056 b992414646e5a0f6a91f52679856021d.exe 30 PID 3056 wrote to memory of 2588 3056 b992414646e5a0f6a91f52679856021d.exe 32 PID 3056 wrote to memory of 2588 3056 b992414646e5a0f6a91f52679856021d.exe 32 PID 3056 wrote to memory of 2588 3056 b992414646e5a0f6a91f52679856021d.exe 32 PID 3056 wrote to memory of 2588 3056 b992414646e5a0f6a91f52679856021d.exe 32 PID 2588 wrote to memory of 2512 2588 cmd.exe 34 PID 2588 wrote to memory of 2512 2588 cmd.exe 34 PID 2588 wrote to memory of 2512 2588 cmd.exe 34 PID 2588 wrote to memory of 2512 2588 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\b992414646e5a0f6a91f52679856021d.exe"C:\Users\Admin\AppData\Local\Temp\b992414646e5a0f6a91f52679856021d.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\b992414646e5a0f6a91f52679856021d.exeC:\Users\Admin\AppData\Local\Temp\b992414646e5a0f6a91f52679856021d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\b992414646e5a0f6a91f52679856021d.exe" /TN MJu5Ub8Eff50 /F3⤵
- Creates scheduled task(s)
PID:2560
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN MJu5Ub8Eff50 > C:\Users\Admin\AppData\Local\Temp\gU6KpD.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN MJu5Ub8Eff504⤵PID:2512
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
241KB
MD51fe11137e7b1415b1c5ea0ee2513bd5e
SHA12e4d85a0ea7493e5a73ba12f099a39b45cd305de
SHA2560f726a2e12578111b8ede218b26f8952a860188318e4e968612de6f77314b3d4
SHA5123765a76724f89edbbd3756b8427f6778ab6903ca49215545597855623ca561aeed6a77ac1451f39683c2b12a74d68e3f30851ad6b4450e764384aba4087874c5
-
Filesize
1KB
MD5c84fca3db758e154d0860a5c19bf4199
SHA18f6105fa2d909528e2e4acd5538fcaad91284d49
SHA256e7b6d1f5115c097797e8a0ba530fe55c44f324444bd1bd59c98a2fe2eb9a8c6c
SHA51269469e8089fcf4bd1b225d9a152651b2dbe4c3f6af2b0cab169fd9cb8a4e5ad9588a5559ce48a62fb77090f73ce3e1133c6f8c59bb9e072ca86046fc8d571848
-
Filesize
868KB
MD57ae690425945794ae804467107407c26
SHA1bbb6cc545cc6bb332a3373ce47525148d816f688
SHA256187b68e71b487a07e38ea58a85d0a0c849b44fb0ce5526295803ef8f362b93e5
SHA512802a0f0d9c11c9332bf06b7e7f7b444ad0bef5fd0902fd73d2703e32ac44e796fba92ec04ee89c56e92e17741bf81f93f259b59397139fc6fe840033cf190b78