Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12-03-2024 18:33
Behavioral task
behavioral1
Sample
c40ff7d4fbae3ba144f8739f7a7c2035.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c40ff7d4fbae3ba144f8739f7a7c2035.exe
Resource
win10v2004-20240226-en
General
-
Target
c40ff7d4fbae3ba144f8739f7a7c2035.exe
-
Size
1003KB
-
MD5
c40ff7d4fbae3ba144f8739f7a7c2035
-
SHA1
34683380e66e19640d89dd5e48c98d0e582c4b45
-
SHA256
dcefe181389e4bbae16b0a5b0a9f705819c087f9afff15a797f4778af0e9757e
-
SHA512
6d94b7aa2e17ecfc0d5fefac229d508724481567e0f2fd1ca4edeaa1bd37d2eb0b234aa92cf029a74158048acbf315dfbed4a182c669baef6ff4b83cb34fb855
-
SSDEEP
24576:kNEIrnsALyscY1oqAacVonPHke5gEgKjwnS:kNE4nsAescPqAacVekV1KjwnS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1884 c40ff7d4fbae3ba144f8739f7a7c2035.exe -
Executes dropped EXE 1 IoCs
pid Process 1884 c40ff7d4fbae3ba144f8739f7a7c2035.exe -
Loads dropped DLL 1 IoCs
pid Process 1836 c40ff7d4fbae3ba144f8739f7a7c2035.exe -
resource yara_rule behavioral1/memory/1836-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000b000000012250-11.dat upx behavioral1/files/0x000b000000012250-15.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2488 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 c40ff7d4fbae3ba144f8739f7a7c2035.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 c40ff7d4fbae3ba144f8739f7a7c2035.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 c40ff7d4fbae3ba144f8739f7a7c2035.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 c40ff7d4fbae3ba144f8739f7a7c2035.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1836 c40ff7d4fbae3ba144f8739f7a7c2035.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1836 c40ff7d4fbae3ba144f8739f7a7c2035.exe 1884 c40ff7d4fbae3ba144f8739f7a7c2035.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1836 wrote to memory of 1884 1836 c40ff7d4fbae3ba144f8739f7a7c2035.exe 29 PID 1836 wrote to memory of 1884 1836 c40ff7d4fbae3ba144f8739f7a7c2035.exe 29 PID 1836 wrote to memory of 1884 1836 c40ff7d4fbae3ba144f8739f7a7c2035.exe 29 PID 1836 wrote to memory of 1884 1836 c40ff7d4fbae3ba144f8739f7a7c2035.exe 29 PID 1884 wrote to memory of 2488 1884 c40ff7d4fbae3ba144f8739f7a7c2035.exe 30 PID 1884 wrote to memory of 2488 1884 c40ff7d4fbae3ba144f8739f7a7c2035.exe 30 PID 1884 wrote to memory of 2488 1884 c40ff7d4fbae3ba144f8739f7a7c2035.exe 30 PID 1884 wrote to memory of 2488 1884 c40ff7d4fbae3ba144f8739f7a7c2035.exe 30 PID 1884 wrote to memory of 2472 1884 c40ff7d4fbae3ba144f8739f7a7c2035.exe 32 PID 1884 wrote to memory of 2472 1884 c40ff7d4fbae3ba144f8739f7a7c2035.exe 32 PID 1884 wrote to memory of 2472 1884 c40ff7d4fbae3ba144f8739f7a7c2035.exe 32 PID 1884 wrote to memory of 2472 1884 c40ff7d4fbae3ba144f8739f7a7c2035.exe 32 PID 2472 wrote to memory of 2388 2472 cmd.exe 34 PID 2472 wrote to memory of 2388 2472 cmd.exe 34 PID 2472 wrote to memory of 2388 2472 cmd.exe 34 PID 2472 wrote to memory of 2388 2472 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\c40ff7d4fbae3ba144f8739f7a7c2035.exe"C:\Users\Admin\AppData\Local\Temp\c40ff7d4fbae3ba144f8739f7a7c2035.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\c40ff7d4fbae3ba144f8739f7a7c2035.exeC:\Users\Admin\AppData\Local\Temp\c40ff7d4fbae3ba144f8739f7a7c2035.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\c40ff7d4fbae3ba144f8739f7a7c2035.exe" /TN ZBrUCVBB2555 /F3⤵
- Creates scheduled task(s)
PID:2488
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN ZBrUCVBB2555 > C:\Users\Admin\AppData\Local\Temp\ISEtZQiFo.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN ZBrUCVBB25554⤵PID:2388
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD538fd129f88a6c99621460e60cc34bec5
SHA1868a2be1655f61618ed7e6dfa1e181635e827ee8
SHA256327528d8bc4506422677c86b7c186ba546c3770aae5eaa21916d8fb178c02d1c
SHA51275e4ab01c427d2f5d667abb5c459ac90a882426dd1bf516dd0faa3ab201df544427dfaf2ac54e152a0d4ab0a0bdd411820f299bdfae24c0b68650085a9b976c4
-
Filesize
898KB
MD5f6fcaaf28dc6635117a8c0dd4ef639f5
SHA175642d3f0e7fc6025b765339e4420e154effdb5c
SHA256c7dd411b39a1461eb341ee66c7c9a76f1e3c7f37798e3918ce331861e530075c
SHA5125961e68148abbb2c2c47d2235d106a258694da49c1461cd63bcd25179e52f79e6280317dacd6bed633bb7356938fe1316dc018943341c82d0a45bc3eaa9b5a46
-
Filesize
1003KB
MD502401133061bde4df435320e41f0cb21
SHA1b1c7183fcead8dda29917e034025d8fea41b9513
SHA256f35d5d69844df25471123cb4e8197442c267df044b3e5e6074cb512ab2de4222
SHA51233324d090a04d03cd7363fb5377fcc58684427c27670cede032654469f05b0e1b67c5f3367340cdd5a5fb6d17a5197efac0eb0a8c821255640450ba40e7703b3