Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/03/2024, 00:50
Behavioral task
behavioral1
Sample
d77feb63589d1344eff514d1d9221fb1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d77feb63589d1344eff514d1d9221fb1.exe
Resource
win10v2004-20240226-en
General
-
Target
d77feb63589d1344eff514d1d9221fb1.exe
-
Size
3.0MB
-
MD5
d77feb63589d1344eff514d1d9221fb1
-
SHA1
3e230b633a2087ce893c7a113779bb34bfe5685d
-
SHA256
7d93d940688fa181beb3cc4900c72a881d5ac62fb35c9e8af0fb6b1b7a24f4e3
-
SHA512
1b77fbd127b31ac66a00fc969bd7f7d6568e8fd5b28601f10f9bbf723a232ddd923d0cb05e148f0bf32d7a2306a9fe5bb1e6c498f92fc10c0b68f99c7e60dd96
-
SSDEEP
49152:rmbtTQfb48Cfw/ejQs7TvncakLWqhC2TH5t8NlqMcakLkv7lVdBAo1MkycakLWqz:rmpTQfE8Cfw/ejQs7TvncakKaC2TZt8x
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3040 d77feb63589d1344eff514d1d9221fb1.exe -
Executes dropped EXE 1 IoCs
pid Process 3040 d77feb63589d1344eff514d1d9221fb1.exe -
Loads dropped DLL 1 IoCs
pid Process 2352 d77feb63589d1344eff514d1d9221fb1.exe -
resource yara_rule behavioral1/memory/2352-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000a000000012251-11.dat upx behavioral1/memory/2352-16-0x00000000234B0000-0x000000002370C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2652 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 d77feb63589d1344eff514d1d9221fb1.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 d77feb63589d1344eff514d1d9221fb1.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 d77feb63589d1344eff514d1d9221fb1.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 d77feb63589d1344eff514d1d9221fb1.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2352 d77feb63589d1344eff514d1d9221fb1.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2352 d77feb63589d1344eff514d1d9221fb1.exe 3040 d77feb63589d1344eff514d1d9221fb1.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2352 wrote to memory of 3040 2352 d77feb63589d1344eff514d1d9221fb1.exe 29 PID 2352 wrote to memory of 3040 2352 d77feb63589d1344eff514d1d9221fb1.exe 29 PID 2352 wrote to memory of 3040 2352 d77feb63589d1344eff514d1d9221fb1.exe 29 PID 2352 wrote to memory of 3040 2352 d77feb63589d1344eff514d1d9221fb1.exe 29 PID 3040 wrote to memory of 2652 3040 d77feb63589d1344eff514d1d9221fb1.exe 30 PID 3040 wrote to memory of 2652 3040 d77feb63589d1344eff514d1d9221fb1.exe 30 PID 3040 wrote to memory of 2652 3040 d77feb63589d1344eff514d1d9221fb1.exe 30 PID 3040 wrote to memory of 2652 3040 d77feb63589d1344eff514d1d9221fb1.exe 30 PID 3040 wrote to memory of 2640 3040 d77feb63589d1344eff514d1d9221fb1.exe 32 PID 3040 wrote to memory of 2640 3040 d77feb63589d1344eff514d1d9221fb1.exe 32 PID 3040 wrote to memory of 2640 3040 d77feb63589d1344eff514d1d9221fb1.exe 32 PID 3040 wrote to memory of 2640 3040 d77feb63589d1344eff514d1d9221fb1.exe 32 PID 2640 wrote to memory of 2564 2640 cmd.exe 34 PID 2640 wrote to memory of 2564 2640 cmd.exe 34 PID 2640 wrote to memory of 2564 2640 cmd.exe 34 PID 2640 wrote to memory of 2564 2640 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\d77feb63589d1344eff514d1d9221fb1.exe"C:\Users\Admin\AppData\Local\Temp\d77feb63589d1344eff514d1d9221fb1.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\d77feb63589d1344eff514d1d9221fb1.exeC:\Users\Admin\AppData\Local\Temp\d77feb63589d1344eff514d1d9221fb1.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\d77feb63589d1344eff514d1d9221fb1.exe" /TN WiDkBlJDe41e /F3⤵
- Creates scheduled task(s)
PID:2652
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN WiDkBlJDe41e > C:\Users\Admin\AppData\Local\Temp\frnTVgA.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN WiDkBlJDe41e4⤵PID:2564
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5449a22f752360480a07c0bbc4cf355cd
SHA1293629e5d6582982ccc500e87973dda4496c0d15
SHA256d5a5a141a556c0a629449392189e92cfeb962833e958ea40f0a00e83db022b74
SHA51271615bc909ccaf62af64dc4ad5b922c8fcb6bf4e0020a0c3e4287646279e20342b43a654cd62f2e72a4378c54a19d0737feea36004b3732e11f201a43009c263
-
Filesize
3.0MB
MD5d9599748b18297cec005f20b86cc834f
SHA14206f1baeeca22ffa5237fc95daecc3b0ec54218
SHA25613be546f2de84624d7fb97311ba1a2fb9e597682187b878d81f26887a2aacdfc
SHA512da6736f52a5a61dcaaaa01faedfa4967195f56c85ad95784d2261bba2a6d9377f6a0f2f3376d2bef71fdeab49e78565a5ddec3b180b7631226cb6ce4ad87e3e9