Analysis
-
max time kernel
142s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 05:08
Behavioral task
behavioral1
Sample
ca8e71a42dd2b2d54c121cb42ab963fb.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ca8e71a42dd2b2d54c121cb42ab963fb.exe
Resource
win10v2004-20240226-en
General
-
Target
ca8e71a42dd2b2d54c121cb42ab963fb.exe
-
Size
501KB
-
MD5
ca8e71a42dd2b2d54c121cb42ab963fb
-
SHA1
282ca9283979193690cde53d1de2513c352e69dc
-
SHA256
c1cb59cc8ee4cb78561c34fcf96409e6f28e882917a2845baa3ef23fd8d0c180
-
SHA512
3ea910c47410d50aff9594edff9334fd74b6e6654c182fa1be0172f71a4cd601767927bf01e8bbf5b2b180bba12185c76617107070e1c0cdd95b95cbb6681218
-
SSDEEP
12288:8Ou0Jd1NEzNlRUK8xc35DODKJVzxoNo5d:Z7zuXUK4W5quZxoY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2324 ca8e71a42dd2b2d54c121cb42ab963fb.exe -
Executes dropped EXE 1 IoCs
pid Process 2324 ca8e71a42dd2b2d54c121cb42ab963fb.exe -
Loads dropped DLL 1 IoCs
pid Process 1888 ca8e71a42dd2b2d54c121cb42ab963fb.exe -
resource yara_rule behavioral1/memory/1888-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000d000000012247-11.dat upx behavioral1/memory/1888-16-0x0000000022F10000-0x000000002316C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2564 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 ca8e71a42dd2b2d54c121cb42ab963fb.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 ca8e71a42dd2b2d54c121cb42ab963fb.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 ca8e71a42dd2b2d54c121cb42ab963fb.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 ca8e71a42dd2b2d54c121cb42ab963fb.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1888 ca8e71a42dd2b2d54c121cb42ab963fb.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1888 ca8e71a42dd2b2d54c121cb42ab963fb.exe 2324 ca8e71a42dd2b2d54c121cb42ab963fb.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1888 wrote to memory of 2324 1888 ca8e71a42dd2b2d54c121cb42ab963fb.exe 29 PID 1888 wrote to memory of 2324 1888 ca8e71a42dd2b2d54c121cb42ab963fb.exe 29 PID 1888 wrote to memory of 2324 1888 ca8e71a42dd2b2d54c121cb42ab963fb.exe 29 PID 1888 wrote to memory of 2324 1888 ca8e71a42dd2b2d54c121cb42ab963fb.exe 29 PID 2324 wrote to memory of 2564 2324 ca8e71a42dd2b2d54c121cb42ab963fb.exe 30 PID 2324 wrote to memory of 2564 2324 ca8e71a42dd2b2d54c121cb42ab963fb.exe 30 PID 2324 wrote to memory of 2564 2324 ca8e71a42dd2b2d54c121cb42ab963fb.exe 30 PID 2324 wrote to memory of 2564 2324 ca8e71a42dd2b2d54c121cb42ab963fb.exe 30 PID 2324 wrote to memory of 2724 2324 ca8e71a42dd2b2d54c121cb42ab963fb.exe 32 PID 2324 wrote to memory of 2724 2324 ca8e71a42dd2b2d54c121cb42ab963fb.exe 32 PID 2324 wrote to memory of 2724 2324 ca8e71a42dd2b2d54c121cb42ab963fb.exe 32 PID 2324 wrote to memory of 2724 2324 ca8e71a42dd2b2d54c121cb42ab963fb.exe 32 PID 2724 wrote to memory of 1936 2724 cmd.exe 34 PID 2724 wrote to memory of 1936 2724 cmd.exe 34 PID 2724 wrote to memory of 1936 2724 cmd.exe 34 PID 2724 wrote to memory of 1936 2724 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca8e71a42dd2b2d54c121cb42ab963fb.exe"C:\Users\Admin\AppData\Local\Temp\ca8e71a42dd2b2d54c121cb42ab963fb.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\ca8e71a42dd2b2d54c121cb42ab963fb.exeC:\Users\Admin\AppData\Local\Temp\ca8e71a42dd2b2d54c121cb42ab963fb.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\ca8e71a42dd2b2d54c121cb42ab963fb.exe" /TN byLTKWnBb85a /F3⤵
- Creates scheduled task(s)
PID:2564
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN byLTKWnBb85a > C:\Users\Admin\AppData\Local\Temp\HMrJwe.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN byLTKWnBb85a4⤵PID:1936
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD527f9bd8c1224a8f3a67761a40c5ed86d
SHA1b8822c699e85cbbbc0bd1596301b37614f398357
SHA2564237b8a03dd9f9eb3949cd69039a015cbe8da0f561a195a8016fc2c5617c470e
SHA512c346c6e954cabbf1f0ef8ff5a716652b9232a0aa2c738efb917205f5edee2270f10f09c62bbd1962f9f9ccde3eb04be77b8e2b8113abb04d5220387b2dbd0566
-
Filesize
501KB
MD5ecb07b94d2c9377e5d9aab2affef0bdd
SHA16af3b7d87387ed76985af6c0031dc2c6880d923e
SHA2564c91c79ed16a9a7fc21c55b98f837deaa2aa4f8bfcf5f8051eba591552f9e93a
SHA512ece0ec44e70c4218d450e2900649ef45711b1dfa9059a2a56e0cb2d00c3936193f03ac1f99e070fba89a86736c255b1d91ad7c7f57d18b4585c24020f4041d5c