Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-03-2024 05:42
Behavioral task
behavioral1
Sample
e0e891b34b91e778c6de8cf7ffdedffc.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e0e891b34b91e778c6de8cf7ffdedffc.exe
Resource
win10v2004-20240226-en
General
-
Target
e0e891b34b91e778c6de8cf7ffdedffc.exe
-
Size
1003KB
-
MD5
e0e891b34b91e778c6de8cf7ffdedffc
-
SHA1
2dd796db4509c985aaae689a3821f14f97cf23b9
-
SHA256
83128aafeb1b52e576e86a170131ada6eaa2043c97fec27f49838d1c96f50cdc
-
SHA512
5d9158546e8abd338031f248d0b7e78d9a84a587be397cee34c5550f5f8a1c11b6bc8450746be8f7e7fa92a564067a249d0c4feca0a79d9377673311a83828d0
-
SSDEEP
24576:pEodsbt+mLuDA3HTeFFjFvplgAdRKlt1:pEoOR+mL33zq1FxlgAdRKlt1
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2772 e0e891b34b91e778c6de8cf7ffdedffc.exe -
Executes dropped EXE 1 IoCs
pid Process 2772 e0e891b34b91e778c6de8cf7ffdedffc.exe -
Loads dropped DLL 1 IoCs
pid Process 2196 e0e891b34b91e778c6de8cf7ffdedffc.exe -
resource yara_rule behavioral1/memory/2196-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000c000000012257-14.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2644 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 e0e891b34b91e778c6de8cf7ffdedffc.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 e0e891b34b91e778c6de8cf7ffdedffc.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 e0e891b34b91e778c6de8cf7ffdedffc.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 030000000100000014000000a053375bfe84e8b748782c7cee15827a6af5a405140000000100000014000000142eb317b75856cbae500940e61faf9d8b14c2c6040000000100000010000000e829e65d7c4307d6fbc13c179e037a360f0000000100000020000000444ebd67bb83f8807b3921e938ac9178b882bd50aadb11231f044cf5f08df7ce190000000100000010000000f044424c506513d62804c04f719403f91800000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000001a05000030820516308202fea003020102021100912b084acf0c18a753f6d62e25a75f5a300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3230303930343030303030305a170d3235303931353136303030305a3032310b300906035504061302555331163014060355040a130d4c6574277320456e6372797074310b300906035504031302523330820122300d06092a864886f70d01010105000382010f003082010a0282010100bb021528ccf6a094d30f12ec8d5592c3f882f199a67a4288a75d26aab52bb9c54cb1af8e6bf975c8a3d70f4794145535578c9ea8a23919f5823c42a94e6ef53bc32edb8dc0b05cf35938e7edcf69f05a0b1bbec094242587fa3771b313e71cace19befdbe43b45524596a9c153ce34c852eeb5aeed8fde6070e2a554abb66d0e97a540346b2bd3bc66eb66347cfa6b8b8f572999f830175dba726ffb81c5add286583d17c7e709bbf12bf786dcc1da715dd446e3ccad25c188bc60677566b3f118f7a25ce653ff3a88b647a5ff1318ea9809773f9d53f9cf01e5f5a6701714af63a4ff99b3939ddc53a706fe48851da169ae2575bb13cc5203f5ed51a18bdb150203010001a382010830820104300e0603551d0f0101ff040403020186301d0603551d250416301406082b0601050507030206082b0601050507030130120603551d130101ff040830060101ff020100301d0603551d0e04160414142eb317b75856cbae500940e61faf9d8b14c2c6301f0603551d2304183016801479b459e67bb6e5e40173800888c81a58f6e99b6e303206082b0601050507010104263024302206082b060105050730028616687474703a2f2f78312e692e6c656e63722e6f72672f30270603551d1f0420301e301ca01aa0188616687474703a2f2f78312e632e6c656e63722e6f72672f30220603551d20041b30193008060667810c010201300d060b2b0601040182df13010101300d06092a864886f70d01010b0500038202010085ca4e473ea3f7854485bcd56778b29863ad754d1e963d336572542d81a0eac3edf820bf5fccb77000b76e3bf65e94dee4209fa6ef8bb203e7a2b5163c91ceb4ed3902e77c258a47e6656e3f46f4d9f0ce942bee54ce12bc8c274bb8c1982fa2afcd71914a08b7c8b8237b042d08f908573e83d904330a472178098227c32ac89bb9ce5cf264c8c0be79c04f8e6d440c5e92bb2ef78b10e1e81d4429db5920ed63b921f81226949357a01d6504c10a22ae100d4397a1181f7ee0e08637b55ab1bd30bf876e2b2aff214e1b05c3f51897f05eacc3a5b86af02ebc3b33b9ee4bdeccfce4af840b863fc0554336f668e136176a8e99d1ffa540a734b7c0d063393539756ef2ba76c89302e9a94b6c17ce0c02d9bd81fb9fb768d40665b3823d7753f88e7903ad0a3107752a43d8559772c4290ef7c45d4ec8ae468430d7f2855f18a179bbe75e708b07e18693c3b98fdc6171252aafdfed255052688b92dce5d6b5e3da7dd0876c842131ae82f5fbb9abc889173de14ce5380ef6bd2bbd968114ebd5db3d20a77e59d3e2f858f95bb848cdfe5c4f1629fe1e5523afc811b08dea7c9390172ffdaca20947463ff0e9b0b7ff284d6832d6675e1e69a393b8f59d8b2f0bd25243a66f3257654d3281df3853855d7e5d6629eab8dde495b5cdb5561242cdc44ec6253844506decce005518fee94964d44eca979cb45bc073a8abb847c2 e0e891b34b91e778c6de8cf7ffdedffc.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2196 e0e891b34b91e778c6de8cf7ffdedffc.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2196 e0e891b34b91e778c6de8cf7ffdedffc.exe 2772 e0e891b34b91e778c6de8cf7ffdedffc.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2772 2196 e0e891b34b91e778c6de8cf7ffdedffc.exe 29 PID 2196 wrote to memory of 2772 2196 e0e891b34b91e778c6de8cf7ffdedffc.exe 29 PID 2196 wrote to memory of 2772 2196 e0e891b34b91e778c6de8cf7ffdedffc.exe 29 PID 2196 wrote to memory of 2772 2196 e0e891b34b91e778c6de8cf7ffdedffc.exe 29 PID 2772 wrote to memory of 2644 2772 e0e891b34b91e778c6de8cf7ffdedffc.exe 30 PID 2772 wrote to memory of 2644 2772 e0e891b34b91e778c6de8cf7ffdedffc.exe 30 PID 2772 wrote to memory of 2644 2772 e0e891b34b91e778c6de8cf7ffdedffc.exe 30 PID 2772 wrote to memory of 2644 2772 e0e891b34b91e778c6de8cf7ffdedffc.exe 30 PID 2772 wrote to memory of 2800 2772 e0e891b34b91e778c6de8cf7ffdedffc.exe 32 PID 2772 wrote to memory of 2800 2772 e0e891b34b91e778c6de8cf7ffdedffc.exe 32 PID 2772 wrote to memory of 2800 2772 e0e891b34b91e778c6de8cf7ffdedffc.exe 32 PID 2772 wrote to memory of 2800 2772 e0e891b34b91e778c6de8cf7ffdedffc.exe 32 PID 2800 wrote to memory of 1876 2800 cmd.exe 34 PID 2800 wrote to memory of 1876 2800 cmd.exe 34 PID 2800 wrote to memory of 1876 2800 cmd.exe 34 PID 2800 wrote to memory of 1876 2800 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0e891b34b91e778c6de8cf7ffdedffc.exe"C:\Users\Admin\AppData\Local\Temp\e0e891b34b91e778c6de8cf7ffdedffc.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\e0e891b34b91e778c6de8cf7ffdedffc.exeC:\Users\Admin\AppData\Local\Temp\e0e891b34b91e778c6de8cf7ffdedffc.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\e0e891b34b91e778c6de8cf7ffdedffc.exe" /TN 5xzkGEJ1bdbc /F3⤵
- Creates scheduled task(s)
PID:2644
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN 5xzkGEJ1bdbc > C:\Users\Admin\AppData\Local\Temp\7inTQ2ije.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN 5xzkGEJ1bdbc4⤵PID:1876
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ab22f476809a7c490f77e0e16aeec8a4
SHA1eee58abbba7c2f31bc04adbbf6272d60e4517370
SHA256f0e23a1970c3ae193cd19d2e9ed7efcab26e912aebcd0ad0dceb677fd1d99b9f
SHA51229af64415b4411db7f184ca7d3e4bd8caed5b514596b9486a430894988059eed2f93572b6b1f64d6a15794a193910bbd06fd2d6f75c1a78a780f9c67f52153e0
-
Filesize
1003KB
MD53c37311f7ce27f6104cb43a1ac97cb17
SHA10a43702561148611ccc32c65a2c2f612eb4c1f29
SHA25651d1bfe5d2fc27505f32be58c9e2871ca2edff21be5ddad7cc29f9657d5fe08c
SHA512b92f6d6f2d21e0730d7951f87927ecf9595805601cf99997bd3fa1641e12c9b5b31eb67885ba205de6fe7c9ecaa0625dddca8fe6c9381e0954ed84301c846589