Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/03/2024, 02:59
Static task
static1
Behavioral task
behavioral1
Sample
ba58ea6b373dd0bc59026912d4b45209.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ba58ea6b373dd0bc59026912d4b45209.exe
Resource
win10v2004-20240226-en
General
-
Target
ba58ea6b373dd0bc59026912d4b45209.exe
-
Size
385KB
-
MD5
ba58ea6b373dd0bc59026912d4b45209
-
SHA1
6e7428beb862138e6f02490e82b3ab4439fa46aa
-
SHA256
e9158e8f12f9e75dcfb78474196cc9eee11702e562c07c1ebea1b1cfadea057c
-
SHA512
34e59601a3312fc730195434469620fc9359e773de3176f6cf471d3b4468ca29a1472458df493fddb6abb8d57c15b84c2b6d3ed6cd429816496b6269f5908da8
-
SSDEEP
12288:Zyx/ltGltkfWSSAFtXDpsN/5GGsbk7zSVEwE0WGNbms02fnHM4zmzptXtd0kZwHq:gx/ltGlt2W8FtXDpsN/5psqzIEwE05Fi
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2880 ba58ea6b373dd0bc59026912d4b45209.exe -
Executes dropped EXE 1 IoCs
pid Process 2880 ba58ea6b373dd0bc59026912d4b45209.exe -
Loads dropped DLL 1 IoCs
pid Process 2752 ba58ea6b373dd0bc59026912d4b45209.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 pastebin.com 4 pastebin.com -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 ba58ea6b373dd0bc59026912d4b45209.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 ba58ea6b373dd0bc59026912d4b45209.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 ba58ea6b373dd0bc59026912d4b45209.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2752 ba58ea6b373dd0bc59026912d4b45209.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2752 ba58ea6b373dd0bc59026912d4b45209.exe 2880 ba58ea6b373dd0bc59026912d4b45209.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2752 wrote to memory of 2880 2752 ba58ea6b373dd0bc59026912d4b45209.exe 28 PID 2752 wrote to memory of 2880 2752 ba58ea6b373dd0bc59026912d4b45209.exe 28 PID 2752 wrote to memory of 2880 2752 ba58ea6b373dd0bc59026912d4b45209.exe 28 PID 2752 wrote to memory of 2880 2752 ba58ea6b373dd0bc59026912d4b45209.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba58ea6b373dd0bc59026912d4b45209.exe"C:\Users\Admin\AppData\Local\Temp\ba58ea6b373dd0bc59026912d4b45209.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\ba58ea6b373dd0bc59026912d4b45209.exeC:\Users\Admin\AppData\Local\Temp\ba58ea6b373dd0bc59026912d4b45209.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
PID:2880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63
-
Filesize
385KB
MD5ee50edfd29f69451d5a3f1e9d79d6c76
SHA1182a934dccbbb29a39748dec2f0eca3c62d93c7a
SHA2561f351e190cd19c6ad9c953cbb82bdfac3f4e7173767bdce364ba7461a5abc8eb
SHA512becc7fb227263af599d2aab42ec9411438ef5aed65b7880f1d749090c5e1396b7f6c5472d30a767aa9e2de2d4bee5c8ebd56e67b825cf2d0b28eeefd1d50dfae
-
Filesize
192KB
MD58c9b18eeb9331846c74028829bb5067a
SHA130eca7308e1745defdaa7f3bb30bd22eee09043b
SHA2562fe966943791190fb56309512a8f237eb8bc7857020bf66eba74c0bed8e74529
SHA5124435673bd7fc32ee077e0aec22a30eeb1b2da45f06cf261f59b9472a21621c24a6e5acafbdea96b5ff8daebc2cde95969664ecb8b54ca2eae0d35399fba05da1