Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 20:31
Behavioral task
behavioral1
Sample
cc5ca1740e1e3d8acf75a7ad956c8179.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
cc5ca1740e1e3d8acf75a7ad956c8179.exe
Resource
win10v2004-20240226-en
General
-
Target
cc5ca1740e1e3d8acf75a7ad956c8179.exe
-
Size
1003KB
-
MD5
cc5ca1740e1e3d8acf75a7ad956c8179
-
SHA1
311f81785d34b5a81d636eb8bf99ceb02afa464a
-
SHA256
a18c6a7874427f906d993fb6477ae7afe1e87fd1173472a491183835ffc5db3c
-
SHA512
73e7fefdafd2b36d529cd81b04d0acfad71dcc73a84bb27106db6eed7a37cb5221e09a5508eac554f36794e61952a5094a1361ce77d3f867b5c7d6490d9bbb1b
-
SSDEEP
24576:hp41XPhpOMQZjyP6St0x9H+aFLsQnxjml9MeiK:hp41XPhpObZ2P6St0xYaFL/nxAX
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3060 cc5ca1740e1e3d8acf75a7ad956c8179.exe -
Executes dropped EXE 1 IoCs
pid Process 3060 cc5ca1740e1e3d8acf75a7ad956c8179.exe -
Loads dropped DLL 1 IoCs
pid Process 2392 cc5ca1740e1e3d8acf75a7ad956c8179.exe -
resource yara_rule behavioral1/memory/2392-6-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000a000000013a71-17.dat upx behavioral1/memory/2392-16-0x0000000022EA0000-0x00000000230FC000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2596 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2392 cc5ca1740e1e3d8acf75a7ad956c8179.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2392 cc5ca1740e1e3d8acf75a7ad956c8179.exe 3060 cc5ca1740e1e3d8acf75a7ad956c8179.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2392 wrote to memory of 3060 2392 cc5ca1740e1e3d8acf75a7ad956c8179.exe 29 PID 2392 wrote to memory of 3060 2392 cc5ca1740e1e3d8acf75a7ad956c8179.exe 29 PID 2392 wrote to memory of 3060 2392 cc5ca1740e1e3d8acf75a7ad956c8179.exe 29 PID 2392 wrote to memory of 3060 2392 cc5ca1740e1e3d8acf75a7ad956c8179.exe 29 PID 3060 wrote to memory of 2596 3060 cc5ca1740e1e3d8acf75a7ad956c8179.exe 30 PID 3060 wrote to memory of 2596 3060 cc5ca1740e1e3d8acf75a7ad956c8179.exe 30 PID 3060 wrote to memory of 2596 3060 cc5ca1740e1e3d8acf75a7ad956c8179.exe 30 PID 3060 wrote to memory of 2596 3060 cc5ca1740e1e3d8acf75a7ad956c8179.exe 30 PID 3060 wrote to memory of 2660 3060 cc5ca1740e1e3d8acf75a7ad956c8179.exe 32 PID 3060 wrote to memory of 2660 3060 cc5ca1740e1e3d8acf75a7ad956c8179.exe 32 PID 3060 wrote to memory of 2660 3060 cc5ca1740e1e3d8acf75a7ad956c8179.exe 32 PID 3060 wrote to memory of 2660 3060 cc5ca1740e1e3d8acf75a7ad956c8179.exe 32 PID 2660 wrote to memory of 2720 2660 cmd.exe 34 PID 2660 wrote to memory of 2720 2660 cmd.exe 34 PID 2660 wrote to memory of 2720 2660 cmd.exe 34 PID 2660 wrote to memory of 2720 2660 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc5ca1740e1e3d8acf75a7ad956c8179.exe"C:\Users\Admin\AppData\Local\Temp\cc5ca1740e1e3d8acf75a7ad956c8179.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\cc5ca1740e1e3d8acf75a7ad956c8179.exeC:\Users\Admin\AppData\Local\Temp\cc5ca1740e1e3d8acf75a7ad956c8179.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\cc5ca1740e1e3d8acf75a7ad956c8179.exe" /TN 6ek6uOO9da42 /F3⤵
- Creates scheduled task(s)
PID:2596
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN 6ek6uOO9da42 > C:\Users\Admin\AppData\Local\Temp\xwAluJhn.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN 6ek6uOO9da424⤵PID:2720
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1003KB
MD53751ef8129cc37d7fa4e29b471e9c2f9
SHA1c4f7f38b22d41f94f035cc396f2d5c366cabc425
SHA2564afbd8a690ba4c4a6008be7ecb8e1b1801f2641416bcfe7161888262b696eed1
SHA5124bb7de85ebff79c2ea45f46aaf43b858b39187785d5d79d8a8d0f60b2f552a21efcf614a3c73be28bfdaa4073837dc50a8d5395ceacdba7164d5d7b014e5de28