Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/03/2024, 15:13
Behavioral task
behavioral1
Sample
de4fa36030ef5aa569e237c23d05836a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
de4fa36030ef5aa569e237c23d05836a.exe
Resource
win10v2004-20240226-en
General
-
Target
de4fa36030ef5aa569e237c23d05836a.exe
-
Size
6.4MB
-
MD5
de4fa36030ef5aa569e237c23d05836a
-
SHA1
ceef7843d6f072444967bd9143a9b67400dd6d8c
-
SHA256
f19e08d4dfe93f146d574ed6d8b4d93391de265128d2d739352374496eaab2c3
-
SHA512
602f10c468164b0188f8d4ca5d5457bc3593af7b0582ea39d197267ddba5197318dcee12517d7d821da9cb703e4c40565e15c57b349efacde45cc651c11092ae
-
SSDEEP
196608:Ze1dT5w6gxldlqRHBLgedlr/7jQdlqRHBLgedlW7CCdlqRHBLgedlr/7jQdlqRHw:Y1dT5n80v3Hv/v3Hv6
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2908 de4fa36030ef5aa569e237c23d05836a.exe -
Executes dropped EXE 1 IoCs
pid Process 2908 de4fa36030ef5aa569e237c23d05836a.exe -
Loads dropped DLL 1 IoCs
pid Process 2744 de4fa36030ef5aa569e237c23d05836a.exe -
resource yara_rule behavioral1/memory/2744-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x0009000000012247-11.dat upx behavioral1/files/0x0009000000012247-17.dat upx behavioral1/memory/2744-16-0x0000000023B20000-0x0000000023D7C000-memory.dmp upx behavioral1/memory/2908-19-0x0000000000400000-0x000000000065C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2756 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 de4fa36030ef5aa569e237c23d05836a.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 de4fa36030ef5aa569e237c23d05836a.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 de4fa36030ef5aa569e237c23d05836a.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 030000000100000014000000a053375bfe84e8b748782c7cee15827a6af5a405140000000100000014000000142eb317b75856cbae500940e61faf9d8b14c2c6040000000100000010000000e829e65d7c4307d6fbc13c179e037a360f0000000100000020000000444ebd67bb83f8807b3921e938ac9178b882bd50aadb11231f044cf5f08df7ce190000000100000010000000f044424c506513d62804c04f719403f91800000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000001a05000030820516308202fea003020102021100912b084acf0c18a753f6d62e25a75f5a300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3230303930343030303030305a170d3235303931353136303030305a3032310b300906035504061302555331163014060355040a130d4c6574277320456e6372797074310b300906035504031302523330820122300d06092a864886f70d01010105000382010f003082010a0282010100bb021528ccf6a094d30f12ec8d5592c3f882f199a67a4288a75d26aab52bb9c54cb1af8e6bf975c8a3d70f4794145535578c9ea8a23919f5823c42a94e6ef53bc32edb8dc0b05cf35938e7edcf69f05a0b1bbec094242587fa3771b313e71cace19befdbe43b45524596a9c153ce34c852eeb5aeed8fde6070e2a554abb66d0e97a540346b2bd3bc66eb66347cfa6b8b8f572999f830175dba726ffb81c5add286583d17c7e709bbf12bf786dcc1da715dd446e3ccad25c188bc60677566b3f118f7a25ce653ff3a88b647a5ff1318ea9809773f9d53f9cf01e5f5a6701714af63a4ff99b3939ddc53a706fe48851da169ae2575bb13cc5203f5ed51a18bdb150203010001a382010830820104300e0603551d0f0101ff040403020186301d0603551d250416301406082b0601050507030206082b0601050507030130120603551d130101ff040830060101ff020100301d0603551d0e04160414142eb317b75856cbae500940e61faf9d8b14c2c6301f0603551d2304183016801479b459e67bb6e5e40173800888c81a58f6e99b6e303206082b0601050507010104263024302206082b060105050730028616687474703a2f2f78312e692e6c656e63722e6f72672f30270603551d1f0420301e301ca01aa0188616687474703a2f2f78312e632e6c656e63722e6f72672f30220603551d20041b30193008060667810c010201300d060b2b0601040182df13010101300d06092a864886f70d01010b0500038202010085ca4e473ea3f7854485bcd56778b29863ad754d1e963d336572542d81a0eac3edf820bf5fccb77000b76e3bf65e94dee4209fa6ef8bb203e7a2b5163c91ceb4ed3902e77c258a47e6656e3f46f4d9f0ce942bee54ce12bc8c274bb8c1982fa2afcd71914a08b7c8b8237b042d08f908573e83d904330a472178098227c32ac89bb9ce5cf264c8c0be79c04f8e6d440c5e92bb2ef78b10e1e81d4429db5920ed63b921f81226949357a01d6504c10a22ae100d4397a1181f7ee0e08637b55ab1bd30bf876e2b2aff214e1b05c3f51897f05eacc3a5b86af02ebc3b33b9ee4bdeccfce4af840b863fc0554336f668e136176a8e99d1ffa540a734b7c0d063393539756ef2ba76c89302e9a94b6c17ce0c02d9bd81fb9fb768d40665b3823d7753f88e7903ad0a3107752a43d8559772c4290ef7c45d4ec8ae468430d7f2855f18a179bbe75e708b07e18693c3b98fdc6171252aafdfed255052688b92dce5d6b5e3da7dd0876c842131ae82f5fbb9abc889173de14ce5380ef6bd2bbd968114ebd5db3d20a77e59d3e2f858f95bb848cdfe5c4f1629fe1e5523afc811b08dea7c9390172ffdaca20947463ff0e9b0b7ff284d6832d6675e1e69a393b8f59d8b2f0bd25243a66f3257654d3281df3853855d7e5d6629eab8dde495b5cdb5561242cdc44ec6253844506decce005518fee94964d44eca979cb45bc073a8abb847c2 de4fa36030ef5aa569e237c23d05836a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2744 de4fa36030ef5aa569e237c23d05836a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2744 de4fa36030ef5aa569e237c23d05836a.exe 2908 de4fa36030ef5aa569e237c23d05836a.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2908 2744 de4fa36030ef5aa569e237c23d05836a.exe 29 PID 2744 wrote to memory of 2908 2744 de4fa36030ef5aa569e237c23d05836a.exe 29 PID 2744 wrote to memory of 2908 2744 de4fa36030ef5aa569e237c23d05836a.exe 29 PID 2744 wrote to memory of 2908 2744 de4fa36030ef5aa569e237c23d05836a.exe 29 PID 2908 wrote to memory of 2756 2908 de4fa36030ef5aa569e237c23d05836a.exe 30 PID 2908 wrote to memory of 2756 2908 de4fa36030ef5aa569e237c23d05836a.exe 30 PID 2908 wrote to memory of 2756 2908 de4fa36030ef5aa569e237c23d05836a.exe 30 PID 2908 wrote to memory of 2756 2908 de4fa36030ef5aa569e237c23d05836a.exe 30 PID 2908 wrote to memory of 2616 2908 de4fa36030ef5aa569e237c23d05836a.exe 32 PID 2908 wrote to memory of 2616 2908 de4fa36030ef5aa569e237c23d05836a.exe 32 PID 2908 wrote to memory of 2616 2908 de4fa36030ef5aa569e237c23d05836a.exe 32 PID 2908 wrote to memory of 2616 2908 de4fa36030ef5aa569e237c23d05836a.exe 32 PID 2616 wrote to memory of 2580 2616 cmd.exe 34 PID 2616 wrote to memory of 2580 2616 cmd.exe 34 PID 2616 wrote to memory of 2580 2616 cmd.exe 34 PID 2616 wrote to memory of 2580 2616 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\de4fa36030ef5aa569e237c23d05836a.exe"C:\Users\Admin\AppData\Local\Temp\de4fa36030ef5aa569e237c23d05836a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\de4fa36030ef5aa569e237c23d05836a.exeC:\Users\Admin\AppData\Local\Temp\de4fa36030ef5aa569e237c23d05836a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\de4fa36030ef5aa569e237c23d05836a.exe" /TN MJu5Ub8Eff50 /F3⤵
- Creates scheduled task(s)
PID:2756
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN MJu5Ub8Eff50 > C:\Users\Admin\AppData\Local\Temp\21F4E.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN MJu5Ub8Eff504⤵PID:2580
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d559cf52ff65ec2563eb240e6f60cce6
SHA1108be70ecf9a5a54507844175b6375a4aa8a4447
SHA2560e95c9b3c14e8c9b59c2c5bed0507f0a9136be24fe6f70a0119aa25e6b585b67
SHA512cc58501a3a9d0c92a9503bc8a2cfd5c866398d6b2b587f3d84579218fb1b154306ae1770638ef376d127613f8dec7ef58238ee6c9207cd54bc75a1960faaf29a
-
Filesize
320KB
MD5ee90f30c0e1ff03f1d339a2d82df3df0
SHA1e593e719190b1924a0936b0985b67bac96587693
SHA25688b95094587c6ad0a85fd677c259cadcb256a8a1616826d9b0be96112a891dcb
SHA512b207466de94ec87287f4ee714deee9964248cca198dbe303e0dfa5b58fa5f09efa90a310bd82a11fe3e41b210c2be0b11e46da0f74c2d662dd0f8968f28a6191
-
Filesize
576KB
MD5070f7ab875939b0ecfca5070711627db
SHA11058b45d5777a4a0b39c7adc3095b162538bef37
SHA25651d52982f6f9f7a202a72dc6e3c7b1e149c601d621d0743d6cc0ab747f429f7d
SHA51270a31adb5670b1998207f5b3d879ced21100dd25b270b4fa85cce0dae27580804f4ac7656fca5937e05bee2f251a238ecc03d49ff61b1a5aa1d841601699be52