Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12-03-2024 13:29
Behavioral task
behavioral1
Sample
c37d021933f5f95019f959649c29d5ba.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c37d021933f5f95019f959649c29d5ba.exe
Resource
win10v2004-20240226-en
General
-
Target
c37d021933f5f95019f959649c29d5ba.exe
-
Size
1003KB
-
MD5
c37d021933f5f95019f959649c29d5ba
-
SHA1
e63dc001b44a38b7ed5b7dbd94b35032da860412
-
SHA256
01b3b18a334d75dbb2616a3e34eafcfccca70825c3a1d02b700f5584d4b98aa5
-
SHA512
c508b6c9b14ee31c0fd67814b15fffbaa796a7af62b91f9f10eab2e6e4c943763796bb2e7e39a621cbb06a28b3fb4954193f927c186b29454750d504e6786af7
-
SSDEEP
24576:9Ctv/nrqWrRdJ2Ek5mMX63YTjFvplgAdRKlt1:9Ctv/eWrN2twMX/XFxlgAdRKlt1
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2648 c37d021933f5f95019f959649c29d5ba.exe -
Executes dropped EXE 1 IoCs
pid Process 2648 c37d021933f5f95019f959649c29d5ba.exe -
Loads dropped DLL 1 IoCs
pid Process 2596 c37d021933f5f95019f959649c29d5ba.exe -
resource yara_rule behavioral1/memory/2596-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000b000000012226-17.dat upx behavioral1/files/0x000b000000012226-11.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3048 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 c37d021933f5f95019f959649c29d5ba.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 c37d021933f5f95019f959649c29d5ba.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 c37d021933f5f95019f959649c29d5ba.exe Set value (data) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 c37d021933f5f95019f959649c29d5ba.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2596 c37d021933f5f95019f959649c29d5ba.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2596 c37d021933f5f95019f959649c29d5ba.exe 2648 c37d021933f5f95019f959649c29d5ba.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2596 wrote to memory of 2648 2596 c37d021933f5f95019f959649c29d5ba.exe 29 PID 2596 wrote to memory of 2648 2596 c37d021933f5f95019f959649c29d5ba.exe 29 PID 2596 wrote to memory of 2648 2596 c37d021933f5f95019f959649c29d5ba.exe 29 PID 2596 wrote to memory of 2648 2596 c37d021933f5f95019f959649c29d5ba.exe 29 PID 2648 wrote to memory of 3048 2648 c37d021933f5f95019f959649c29d5ba.exe 30 PID 2648 wrote to memory of 3048 2648 c37d021933f5f95019f959649c29d5ba.exe 30 PID 2648 wrote to memory of 3048 2648 c37d021933f5f95019f959649c29d5ba.exe 30 PID 2648 wrote to memory of 3048 2648 c37d021933f5f95019f959649c29d5ba.exe 30 PID 2648 wrote to memory of 2588 2648 c37d021933f5f95019f959649c29d5ba.exe 32 PID 2648 wrote to memory of 2588 2648 c37d021933f5f95019f959649c29d5ba.exe 32 PID 2648 wrote to memory of 2588 2648 c37d021933f5f95019f959649c29d5ba.exe 32 PID 2648 wrote to memory of 2588 2648 c37d021933f5f95019f959649c29d5ba.exe 32 PID 2588 wrote to memory of 2516 2588 cmd.exe 34 PID 2588 wrote to memory of 2516 2588 cmd.exe 34 PID 2588 wrote to memory of 2516 2588 cmd.exe 34 PID 2588 wrote to memory of 2516 2588 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\c37d021933f5f95019f959649c29d5ba.exe"C:\Users\Admin\AppData\Local\Temp\c37d021933f5f95019f959649c29d5ba.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\c37d021933f5f95019f959649c29d5ba.exeC:\Users\Admin\AppData\Local\Temp\c37d021933f5f95019f959649c29d5ba.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\c37d021933f5f95019f959649c29d5ba.exe" /TN uoFCMKY16031 /F3⤵
- Creates scheduled task(s)
PID:3048
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN uoFCMKY16031 > C:\Users\Admin\AppData\Local\Temp\ltAn0F.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN uoFCMKY160314⤵PID:2516
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5b18cd8fad07b6c5bf2555fa713cc5041
SHA12b78e69a0c4abf61d84f5ad00a1b675d36dd2575
SHA256ee81fcc25fd9722e4d4bac88b812b6867d0a0a088ecddadd8167bd9f083b6973
SHA512b712fcee7b6926bfb8d1c5a29b09858361c4e9bd5be16d611e5560631d3b5fd6b9aeeba984f66893c0debccf7c7ea3bc2afecdbc16b5d14fac017e354a16a013
-
Filesize
1KB
MD511cd61abfb3f8a05b5bf4750df0b9fa5
SHA130d47887e99b9e16d552ace267cceb6fdff73710
SHA25650b6b68a3bdb76b7a424e3f71b93d4e2ecf7e2d0979ade1d821882f2d6b56f0f
SHA5126d62561f45310f58795e779cb71d6e1386f16f2309956966f5528c353dd3d4dc4a28e792a4b079c7d8f5adbb563865b0b18a380fec9749c57124eeb15c4c45d8
-
Filesize
320KB
MD5d46784dc68655b3791bf39315fedcdda
SHA154ad415442ef9edb4fe18dc4afdd87a0c6a90a7c
SHA2568b26e102cb7c21027858786aa1090ecfb19d53d962fa6be78b31e7c1bfb19cda
SHA512d2997c142602c4a9dc0b30eb11861abe5c134d070b21542aed8cc0437ca74bed261d62b7065d2c84c355ccd204bb549ef9d43d236fa0a2f7372e85881be304ab