Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/03/2024, 17:02
Behavioral task
behavioral1
Sample
bbcb31746759d2d01274cd1ec0036a51.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bbcb31746759d2d01274cd1ec0036a51.exe
Resource
win10v2004-20240226-en
General
-
Target
bbcb31746759d2d01274cd1ec0036a51.exe
-
Size
6.4MB
-
MD5
bbcb31746759d2d01274cd1ec0036a51
-
SHA1
84d15097e5f982361a8e50a0e39be4f74bf1bad5
-
SHA256
c4a69915650e7afc274ca0a491f76d9bcb9607159262149b4cbaaf847c625d15
-
SHA512
e7c1a4f54b5683d45d65149adb624252c3caf553eabd31a9f6262c38a8a83f902b78126de31a45c933f660d6e51425550345e803f3a398bdc537747d8d342137
-
SSDEEP
196608:QRPEf4/odlhS87cdlWPdhXdlhS87cdl7r0VWSG3E9dlhS87cdlWPdhXdlhS87cdw:QFEf4/sS8dS8q4VWSVPS8dS8b
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3008 bbcb31746759d2d01274cd1ec0036a51.exe -
Executes dropped EXE 1 IoCs
pid Process 3008 bbcb31746759d2d01274cd1ec0036a51.exe -
Loads dropped DLL 1 IoCs
pid Process 1140 bbcb31746759d2d01274cd1ec0036a51.exe -
resource yara_rule behavioral1/memory/1140-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000d000000013a11-11.dat upx behavioral1/memory/1140-15-0x0000000023B30000-0x0000000023D8C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2408 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 bbcb31746759d2d01274cd1ec0036a51.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 bbcb31746759d2d01274cd1ec0036a51.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 bbcb31746759d2d01274cd1ec0036a51.exe Set value (data) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 030000000100000014000000a053375bfe84e8b748782c7cee15827a6af5a405140000000100000014000000142eb317b75856cbae500940e61faf9d8b14c2c6040000000100000010000000e829e65d7c4307d6fbc13c179e037a360f0000000100000020000000444ebd67bb83f8807b3921e938ac9178b882bd50aadb11231f044cf5f08df7ce190000000100000010000000f044424c506513d62804c04f719403f91800000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000001a05000030820516308202fea003020102021100912b084acf0c18a753f6d62e25a75f5a300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3230303930343030303030305a170d3235303931353136303030305a3032310b300906035504061302555331163014060355040a130d4c6574277320456e6372797074310b300906035504031302523330820122300d06092a864886f70d01010105000382010f003082010a0282010100bb021528ccf6a094d30f12ec8d5592c3f882f199a67a4288a75d26aab52bb9c54cb1af8e6bf975c8a3d70f4794145535578c9ea8a23919f5823c42a94e6ef53bc32edb8dc0b05cf35938e7edcf69f05a0b1bbec094242587fa3771b313e71cace19befdbe43b45524596a9c153ce34c852eeb5aeed8fde6070e2a554abb66d0e97a540346b2bd3bc66eb66347cfa6b8b8f572999f830175dba726ffb81c5add286583d17c7e709bbf12bf786dcc1da715dd446e3ccad25c188bc60677566b3f118f7a25ce653ff3a88b647a5ff1318ea9809773f9d53f9cf01e5f5a6701714af63a4ff99b3939ddc53a706fe48851da169ae2575bb13cc5203f5ed51a18bdb150203010001a382010830820104300e0603551d0f0101ff040403020186301d0603551d250416301406082b0601050507030206082b0601050507030130120603551d130101ff040830060101ff020100301d0603551d0e04160414142eb317b75856cbae500940e61faf9d8b14c2c6301f0603551d2304183016801479b459e67bb6e5e40173800888c81a58f6e99b6e303206082b0601050507010104263024302206082b060105050730028616687474703a2f2f78312e692e6c656e63722e6f72672f30270603551d1f0420301e301ca01aa0188616687474703a2f2f78312e632e6c656e63722e6f72672f30220603551d20041b30193008060667810c010201300d060b2b0601040182df13010101300d06092a864886f70d01010b0500038202010085ca4e473ea3f7854485bcd56778b29863ad754d1e963d336572542d81a0eac3edf820bf5fccb77000b76e3bf65e94dee4209fa6ef8bb203e7a2b5163c91ceb4ed3902e77c258a47e6656e3f46f4d9f0ce942bee54ce12bc8c274bb8c1982fa2afcd71914a08b7c8b8237b042d08f908573e83d904330a472178098227c32ac89bb9ce5cf264c8c0be79c04f8e6d440c5e92bb2ef78b10e1e81d4429db5920ed63b921f81226949357a01d6504c10a22ae100d4397a1181f7ee0e08637b55ab1bd30bf876e2b2aff214e1b05c3f51897f05eacc3a5b86af02ebc3b33b9ee4bdeccfce4af840b863fc0554336f668e136176a8e99d1ffa540a734b7c0d063393539756ef2ba76c89302e9a94b6c17ce0c02d9bd81fb9fb768d40665b3823d7753f88e7903ad0a3107752a43d8559772c4290ef7c45d4ec8ae468430d7f2855f18a179bbe75e708b07e18693c3b98fdc6171252aafdfed255052688b92dce5d6b5e3da7dd0876c842131ae82f5fbb9abc889173de14ce5380ef6bd2bbd968114ebd5db3d20a77e59d3e2f858f95bb848cdfe5c4f1629fe1e5523afc811b08dea7c9390172ffdaca20947463ff0e9b0b7ff284d6832d6675e1e69a393b8f59d8b2f0bd25243a66f3257654d3281df3853855d7e5d6629eab8dde495b5cdb5561242cdc44ec6253844506decce005518fee94964d44eca979cb45bc073a8abb847c2 bbcb31746759d2d01274cd1ec0036a51.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1140 bbcb31746759d2d01274cd1ec0036a51.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1140 bbcb31746759d2d01274cd1ec0036a51.exe 3008 bbcb31746759d2d01274cd1ec0036a51.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1140 wrote to memory of 3008 1140 bbcb31746759d2d01274cd1ec0036a51.exe 29 PID 1140 wrote to memory of 3008 1140 bbcb31746759d2d01274cd1ec0036a51.exe 29 PID 1140 wrote to memory of 3008 1140 bbcb31746759d2d01274cd1ec0036a51.exe 29 PID 1140 wrote to memory of 3008 1140 bbcb31746759d2d01274cd1ec0036a51.exe 29 PID 3008 wrote to memory of 2408 3008 bbcb31746759d2d01274cd1ec0036a51.exe 30 PID 3008 wrote to memory of 2408 3008 bbcb31746759d2d01274cd1ec0036a51.exe 30 PID 3008 wrote to memory of 2408 3008 bbcb31746759d2d01274cd1ec0036a51.exe 30 PID 3008 wrote to memory of 2408 3008 bbcb31746759d2d01274cd1ec0036a51.exe 30 PID 3008 wrote to memory of 2428 3008 bbcb31746759d2d01274cd1ec0036a51.exe 32 PID 3008 wrote to memory of 2428 3008 bbcb31746759d2d01274cd1ec0036a51.exe 32 PID 3008 wrote to memory of 2428 3008 bbcb31746759d2d01274cd1ec0036a51.exe 32 PID 3008 wrote to memory of 2428 3008 bbcb31746759d2d01274cd1ec0036a51.exe 32 PID 2428 wrote to memory of 1632 2428 cmd.exe 34 PID 2428 wrote to memory of 1632 2428 cmd.exe 34 PID 2428 wrote to memory of 1632 2428 cmd.exe 34 PID 2428 wrote to memory of 1632 2428 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbcb31746759d2d01274cd1ec0036a51.exe"C:\Users\Admin\AppData\Local\Temp\bbcb31746759d2d01274cd1ec0036a51.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\bbcb31746759d2d01274cd1ec0036a51.exeC:\Users\Admin\AppData\Local\Temp\bbcb31746759d2d01274cd1ec0036a51.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\bbcb31746759d2d01274cd1ec0036a51.exe" /TN uoFCMKY16031 /F3⤵
- Creates scheduled task(s)
PID:2408
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN uoFCMKY16031 > C:\Users\Admin\AppData\Local\Temp\zYOCRbjjK.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN uoFCMKY160314⤵PID:1632
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD501af37068e7c39898386b35af8cf0759
SHA123fcf56925f426305c32317a6aa137db307669c3
SHA2564117a67b2c5eb6fccd026bf23f74bd3b62e2b1f560219399d76434576963e82a
SHA512bcaa75bbed6bc70184688d0f749e45a36c09ffc406e063d12b6e38754dc39b0f38f2a7fe8677a0e66d54bb89a993d663a2d85d5cf38f84c66cf3bd457ea8a3a3
-
Filesize
6.4MB
MD5916ac0a0e109643e796381b5a380d1de
SHA11cfb7cf17ba88036c9c087317e98490f13e524a2
SHA256f1395b84da6af4151a45e8edb850fbf1f60d7f91c51290e36523c5731a66dc95
SHA5122ea6b39a5880aebb0ac69ed974f25ad56ea82be82468f0fb80e7b1ea5a64f1a4d1e055b6d84ccae6d4ee942244b711923d7e782ce414bb2290422a832e913fd1