Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 09:58
Behavioral task
behavioral1
Sample
c85656e7b67565290d823fa08a8d2906.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c85656e7b67565290d823fa08a8d2906.exe
Resource
win10v2004-20240226-en
General
-
Target
c85656e7b67565290d823fa08a8d2906.exe
-
Size
7.8MB
-
MD5
c85656e7b67565290d823fa08a8d2906
-
SHA1
3bbcf7cc798c41a1a716d0acda9430c03f318d48
-
SHA256
53e2d0f46865300232b5de2ecb0be91f279d09f0b1f354a1ad614628bf72a761
-
SHA512
6fb5b0587cfe1296671530e88befa43bb456232dc3cfdd5ac466cca693ea9fbdff99e1f4405bc2f08fbbf1d3fa17fccb4d4e92bbfda4355a5eb12ee07cea3783
-
SSDEEP
196608:dzOH5tith7FkNqKee0Lh7FkNqKO0sf+Wh7FkNqKee0Lh7FkNqKreDOBQrh7FkNqo:dOZgH7upq7upO0sfJ7upq7upregQ97uH
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2124 c85656e7b67565290d823fa08a8d2906.exe -
Executes dropped EXE 1 IoCs
pid Process 2124 c85656e7b67565290d823fa08a8d2906.exe -
Loads dropped DLL 1 IoCs
pid Process 1984 c85656e7b67565290d823fa08a8d2906.exe -
resource yara_rule behavioral1/memory/1984-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000d000000013a11-11.dat upx behavioral1/memory/1984-16-0x0000000023F90000-0x00000000241EC000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2548 schtasks.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 c85656e7b67565290d823fa08a8d2906.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 c85656e7b67565290d823fa08a8d2906.exe Set value (data) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 030000000100000014000000a053375bfe84e8b748782c7cee15827a6af5a405140000000100000014000000142eb317b75856cbae500940e61faf9d8b14c2c6040000000100000010000000e829e65d7c4307d6fbc13c179e037a360f0000000100000020000000444ebd67bb83f8807b3921e938ac9178b882bd50aadb11231f044cf5f08df7ce190000000100000010000000f044424c506513d62804c04f719403f91800000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000001a05000030820516308202fea003020102021100912b084acf0c18a753f6d62e25a75f5a300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3230303930343030303030305a170d3235303931353136303030305a3032310b300906035504061302555331163014060355040a130d4c6574277320456e6372797074310b300906035504031302523330820122300d06092a864886f70d01010105000382010f003082010a0282010100bb021528ccf6a094d30f12ec8d5592c3f882f199a67a4288a75d26aab52bb9c54cb1af8e6bf975c8a3d70f4794145535578c9ea8a23919f5823c42a94e6ef53bc32edb8dc0b05cf35938e7edcf69f05a0b1bbec094242587fa3771b313e71cace19befdbe43b45524596a9c153ce34c852eeb5aeed8fde6070e2a554abb66d0e97a540346b2bd3bc66eb66347cfa6b8b8f572999f830175dba726ffb81c5add286583d17c7e709bbf12bf786dcc1da715dd446e3ccad25c188bc60677566b3f118f7a25ce653ff3a88b647a5ff1318ea9809773f9d53f9cf01e5f5a6701714af63a4ff99b3939ddc53a706fe48851da169ae2575bb13cc5203f5ed51a18bdb150203010001a382010830820104300e0603551d0f0101ff040403020186301d0603551d250416301406082b0601050507030206082b0601050507030130120603551d130101ff040830060101ff020100301d0603551d0e04160414142eb317b75856cbae500940e61faf9d8b14c2c6301f0603551d2304183016801479b459e67bb6e5e40173800888c81a58f6e99b6e303206082b0601050507010104263024302206082b060105050730028616687474703a2f2f78312e692e6c656e63722e6f72672f30270603551d1f0420301e301ca01aa0188616687474703a2f2f78312e632e6c656e63722e6f72672f30220603551d20041b30193008060667810c010201300d060b2b0601040182df13010101300d06092a864886f70d01010b0500038202010085ca4e473ea3f7854485bcd56778b29863ad754d1e963d336572542d81a0eac3edf820bf5fccb77000b76e3bf65e94dee4209fa6ef8bb203e7a2b5163c91ceb4ed3902e77c258a47e6656e3f46f4d9f0ce942bee54ce12bc8c274bb8c1982fa2afcd71914a08b7c8b8237b042d08f908573e83d904330a472178098227c32ac89bb9ce5cf264c8c0be79c04f8e6d440c5e92bb2ef78b10e1e81d4429db5920ed63b921f81226949357a01d6504c10a22ae100d4397a1181f7ee0e08637b55ab1bd30bf876e2b2aff214e1b05c3f51897f05eacc3a5b86af02ebc3b33b9ee4bdeccfce4af840b863fc0554336f668e136176a8e99d1ffa540a734b7c0d063393539756ef2ba76c89302e9a94b6c17ce0c02d9bd81fb9fb768d40665b3823d7753f88e7903ad0a3107752a43d8559772c4290ef7c45d4ec8ae468430d7f2855f18a179bbe75e708b07e18693c3b98fdc6171252aafdfed255052688b92dce5d6b5e3da7dd0876c842131ae82f5fbb9abc889173de14ce5380ef6bd2bbd968114ebd5db3d20a77e59d3e2f858f95bb848cdfe5c4f1629fe1e5523afc811b08dea7c9390172ffdaca20947463ff0e9b0b7ff284d6832d6675e1e69a393b8f59d8b2f0bd25243a66f3257654d3281df3853855d7e5d6629eab8dde495b5cdb5561242cdc44ec6253844506decce005518fee94964d44eca979cb45bc073a8abb847c2 c85656e7b67565290d823fa08a8d2906.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 c85656e7b67565290d823fa08a8d2906.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1984 c85656e7b67565290d823fa08a8d2906.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1984 c85656e7b67565290d823fa08a8d2906.exe 2124 c85656e7b67565290d823fa08a8d2906.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2124 1984 c85656e7b67565290d823fa08a8d2906.exe 29 PID 1984 wrote to memory of 2124 1984 c85656e7b67565290d823fa08a8d2906.exe 29 PID 1984 wrote to memory of 2124 1984 c85656e7b67565290d823fa08a8d2906.exe 29 PID 1984 wrote to memory of 2124 1984 c85656e7b67565290d823fa08a8d2906.exe 29 PID 2124 wrote to memory of 2548 2124 c85656e7b67565290d823fa08a8d2906.exe 30 PID 2124 wrote to memory of 2548 2124 c85656e7b67565290d823fa08a8d2906.exe 30 PID 2124 wrote to memory of 2548 2124 c85656e7b67565290d823fa08a8d2906.exe 30 PID 2124 wrote to memory of 2548 2124 c85656e7b67565290d823fa08a8d2906.exe 30 PID 2124 wrote to memory of 2436 2124 c85656e7b67565290d823fa08a8d2906.exe 32 PID 2124 wrote to memory of 2436 2124 c85656e7b67565290d823fa08a8d2906.exe 32 PID 2124 wrote to memory of 2436 2124 c85656e7b67565290d823fa08a8d2906.exe 32 PID 2124 wrote to memory of 2436 2124 c85656e7b67565290d823fa08a8d2906.exe 32 PID 2436 wrote to memory of 2800 2436 cmd.exe 34 PID 2436 wrote to memory of 2800 2436 cmd.exe 34 PID 2436 wrote to memory of 2800 2436 cmd.exe 34 PID 2436 wrote to memory of 2800 2436 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\c85656e7b67565290d823fa08a8d2906.exe"C:\Users\Admin\AppData\Local\Temp\c85656e7b67565290d823fa08a8d2906.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\c85656e7b67565290d823fa08a8d2906.exeC:\Users\Admin\AppData\Local\Temp\c85656e7b67565290d823fa08a8d2906.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\c85656e7b67565290d823fa08a8d2906.exe" /TN uoFCMKY16031 /F3⤵
- Creates scheduled task(s)
PID:2548
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN uoFCMKY16031 > C:\Users\Admin\AppData\Local\Temp\2ubYRtv.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN uoFCMKY160314⤵PID:2800
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5cee5cf462db02377758ea12de6e6f1b8
SHA1599ad362055e751598bd46dcc3784058f6270bfb
SHA25621bd24ad4617a429018f5b84551a0cc7880292e12f70dc65f35b9bb488522146
SHA5127b15aa792ee524b514bbd0ef60182451aaf12d81f9be0c8bf2b145eca68f6af89bfd4f19e7d415e0f23bde6944e2b0b1f1ac4cd30118bb047224420e62bc7249
-
Filesize
7.8MB
MD586be4d773310c3cd97ce71458609771a
SHA17bf238e259c5966bb13a8b00e025521ca568c456
SHA256149826ee11388357d9310186169611353930b0c5b73436b4c943c26539fe2dec
SHA512bf3d3fbd0165ebd0b5038838fae3ea249de8022e444b852d948439e817b04ce6f800e7d3f3b74da7aebb5d5354b92cc554ba713cd013e00d84ee163b3668cc96