Analysis
-
max time kernel
139s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 07:14
Behavioral task
behavioral1
Sample
e116b6ba330cdb4b9db279673ce13aec.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e116b6ba330cdb4b9db279673ce13aec.exe
Resource
win10v2004-20240226-en
General
-
Target
e116b6ba330cdb4b9db279673ce13aec.exe
-
Size
3.0MB
-
MD5
e116b6ba330cdb4b9db279673ce13aec
-
SHA1
d0004202360a8147673d6f71ff5751afc22d50c3
-
SHA256
81ff1c11e80fc37f6e4de0cb3bc0a02e99f0cf45a08c6ebc87faa62be5667cfc
-
SHA512
8513114a732982ffcea4cb8c3f2d363b907374db9d9a13ef399130ca11c2cc97770847619656a2ef903ac44b15cc5186a76628e600a7644f0eb7d94ecb9c8b9b
-
SSDEEP
49152:GwMrFWmv6KuVeYcakLVy5dv5sgpkB5+PcakL6dnOXfmP2DfcakLVy5dv5sgpkB5B:G/r4mv6KLYcakhy595sgp9cakOdnOXfO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2484 e116b6ba330cdb4b9db279673ce13aec.exe -
Executes dropped EXE 1 IoCs
pid Process 2484 e116b6ba330cdb4b9db279673ce13aec.exe -
Loads dropped DLL 1 IoCs
pid Process 2740 e116b6ba330cdb4b9db279673ce13aec.exe -
resource yara_rule behavioral1/memory/2740-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x0008000000012262-11.dat upx behavioral1/files/0x0008000000012262-17.dat upx behavioral1/memory/2484-18-0x0000000000400000-0x000000000065C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1148 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 e116b6ba330cdb4b9db279673ce13aec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 e116b6ba330cdb4b9db279673ce13aec.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 e116b6ba330cdb4b9db279673ce13aec.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 e116b6ba330cdb4b9db279673ce13aec.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2740 e116b6ba330cdb4b9db279673ce13aec.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2740 e116b6ba330cdb4b9db279673ce13aec.exe 2484 e116b6ba330cdb4b9db279673ce13aec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2740 wrote to memory of 2484 2740 e116b6ba330cdb4b9db279673ce13aec.exe 29 PID 2740 wrote to memory of 2484 2740 e116b6ba330cdb4b9db279673ce13aec.exe 29 PID 2740 wrote to memory of 2484 2740 e116b6ba330cdb4b9db279673ce13aec.exe 29 PID 2740 wrote to memory of 2484 2740 e116b6ba330cdb4b9db279673ce13aec.exe 29 PID 2484 wrote to memory of 1148 2484 e116b6ba330cdb4b9db279673ce13aec.exe 30 PID 2484 wrote to memory of 1148 2484 e116b6ba330cdb4b9db279673ce13aec.exe 30 PID 2484 wrote to memory of 1148 2484 e116b6ba330cdb4b9db279673ce13aec.exe 30 PID 2484 wrote to memory of 1148 2484 e116b6ba330cdb4b9db279673ce13aec.exe 30 PID 2484 wrote to memory of 2692 2484 e116b6ba330cdb4b9db279673ce13aec.exe 32 PID 2484 wrote to memory of 2692 2484 e116b6ba330cdb4b9db279673ce13aec.exe 32 PID 2484 wrote to memory of 2692 2484 e116b6ba330cdb4b9db279673ce13aec.exe 32 PID 2484 wrote to memory of 2692 2484 e116b6ba330cdb4b9db279673ce13aec.exe 32 PID 2692 wrote to memory of 2552 2692 cmd.exe 34 PID 2692 wrote to memory of 2552 2692 cmd.exe 34 PID 2692 wrote to memory of 2552 2692 cmd.exe 34 PID 2692 wrote to memory of 2552 2692 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\e116b6ba330cdb4b9db279673ce13aec.exe"C:\Users\Admin\AppData\Local\Temp\e116b6ba330cdb4b9db279673ce13aec.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\e116b6ba330cdb4b9db279673ce13aec.exeC:\Users\Admin\AppData\Local\Temp\e116b6ba330cdb4b9db279673ce13aec.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\e116b6ba330cdb4b9db279673ce13aec.exe" /TN MJu5Ub8Eff50 /F3⤵
- Creates scheduled task(s)
PID:1148
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN MJu5Ub8Eff50 > C:\Users\Admin\AppData\Local\Temp\yiW1tMI7J.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN MJu5Ub8Eff504⤵PID:2552
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD50233f94a9712e731c413751c4679ddd3
SHA1dfbe5e4cff6859ebddb0ea22460b184daf541e37
SHA25641212b8efa75a2a2d0d9bb5a3648124fe0d471b4b892be162e0e73ee9cf20f00
SHA512354fcfc46de9cdd4c573273562ea61aa52240ac8e68ae226e950c1d05da0c48a3d4c3b41d7e3eeb5162ec8f581589a39cda330c7b00389608480464367a51cb9
-
Filesize
1KB
MD595aa0068a87d4087ac5b593700948e5a
SHA1896d939387ac2553fc16884fb424d19834ab6318
SHA2569e482471dda8b8aa7a20a9eac0f80ec595601113ddde99db32b98b63f6bc063a
SHA5122e7de492d612f41b6dacddb0515d363ea83f9ae0add23f8a1dfae78782fcfcb75d4084067bb0e2a9d09ac52158fbfbf6cddf7facc33b14d2cd19dbadb4ad6108
-
Filesize
1024KB
MD5ac01f585bf02690e6b77f39078a7f855
SHA173472d01328565e44711962af1f8c2671a3c6cc5
SHA2562eba83e853d377825e9e22799c49a84323151d7ba448c2fd415211fc4652da34
SHA5122afb077593635f72cd7c7730a5b8d9947a5875133eff4a2d13b49b335573efc49a9703d0fbfbd1c49738252709651e39432feb0d5dc75c9191c3245a1fc9d072