Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
16/03/2024, 11:42
Behavioral task
behavioral1
Sample
cdf9d56e5544512715e0d13f4f34543c.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
cdf9d56e5544512715e0d13f4f34543c.exe
Resource
win10v2004-20240226-en
General
-
Target
cdf9d56e5544512715e0d13f4f34543c.exe
-
Size
1.5MB
-
MD5
cdf9d56e5544512715e0d13f4f34543c
-
SHA1
b10216d522f0ac1068a2001d004cf21ae0836592
-
SHA256
f2c9057ba1a635e113ffa062cab29e719acb122266dd9e5fd031a2e864e5634b
-
SHA512
06789c20c4516494e009c89e958f9685d0f8ef5138432d3412b48d16341f6c16aae99f7122ab499153333d22c87a96d40d436f02e9b35a46e39edb3c1e280f1b
-
SSDEEP
24576:qxooGcIO0DsJ3yTwQLyhWveB+4goGQoadai7D3uITjIFOxo53ApIj:XdOTJyTwQLyhWveB+4goGQ7ai7D3xTgp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2596 cdf9d56e5544512715e0d13f4f34543c.exe -
Executes dropped EXE 1 IoCs
pid Process 2596 cdf9d56e5544512715e0d13f4f34543c.exe -
Loads dropped DLL 1 IoCs
pid Process 2808 cdf9d56e5544512715e0d13f4f34543c.exe -
resource yara_rule behavioral1/memory/2808-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x0009000000012251-11.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2612 schtasks.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 cdf9d56e5544512715e0d13f4f34543c.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 cdf9d56e5544512715e0d13f4f34543c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 cdf9d56e5544512715e0d13f4f34543c.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 cdf9d56e5544512715e0d13f4f34543c.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2808 cdf9d56e5544512715e0d13f4f34543c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2808 cdf9d56e5544512715e0d13f4f34543c.exe 2596 cdf9d56e5544512715e0d13f4f34543c.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2808 wrote to memory of 2596 2808 cdf9d56e5544512715e0d13f4f34543c.exe 29 PID 2808 wrote to memory of 2596 2808 cdf9d56e5544512715e0d13f4f34543c.exe 29 PID 2808 wrote to memory of 2596 2808 cdf9d56e5544512715e0d13f4f34543c.exe 29 PID 2808 wrote to memory of 2596 2808 cdf9d56e5544512715e0d13f4f34543c.exe 29 PID 2596 wrote to memory of 2612 2596 cdf9d56e5544512715e0d13f4f34543c.exe 30 PID 2596 wrote to memory of 2612 2596 cdf9d56e5544512715e0d13f4f34543c.exe 30 PID 2596 wrote to memory of 2612 2596 cdf9d56e5544512715e0d13f4f34543c.exe 30 PID 2596 wrote to memory of 2612 2596 cdf9d56e5544512715e0d13f4f34543c.exe 30 PID 2596 wrote to memory of 2560 2596 cdf9d56e5544512715e0d13f4f34543c.exe 32 PID 2596 wrote to memory of 2560 2596 cdf9d56e5544512715e0d13f4f34543c.exe 32 PID 2596 wrote to memory of 2560 2596 cdf9d56e5544512715e0d13f4f34543c.exe 32 PID 2596 wrote to memory of 2560 2596 cdf9d56e5544512715e0d13f4f34543c.exe 32 PID 2560 wrote to memory of 2644 2560 cmd.exe 34 PID 2560 wrote to memory of 2644 2560 cmd.exe 34 PID 2560 wrote to memory of 2644 2560 cmd.exe 34 PID 2560 wrote to memory of 2644 2560 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdf9d56e5544512715e0d13f4f34543c.exe"C:\Users\Admin\AppData\Local\Temp\cdf9d56e5544512715e0d13f4f34543c.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\cdf9d56e5544512715e0d13f4f34543c.exeC:\Users\Admin\AppData\Local\Temp\cdf9d56e5544512715e0d13f4f34543c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\cdf9d56e5544512715e0d13f4f34543c.exe" /TN w6CK1HQd991c /F3⤵
- Creates scheduled task(s)
PID:2612
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN w6CK1HQd991c > C:\Users\Admin\AppData\Local\Temp\hjZ0z1.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN w6CK1HQd991c4⤵PID:2644
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5e77daf17d02c6fffb0a51e509cd85944
SHA19f1df9566e53c4b2566e04f8343d35627e3cfec7
SHA256cb4ea567bd5a9537796138682018c508e0326b729037707f2391bc39ca9cdc60
SHA51284bf447d8c00096397777da39fb1018865e6788b5f7aa0e67923abe6e128959bf2da15d3891391b3d82bac8d70394ee088ad67234e75f3e60b6eeda4b5937472