Analysis
-
max time kernel
139s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 12:26
Behavioral task
behavioral1
Sample
e1aa8f4c3747d4e93b4f966cb81063f8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e1aa8f4c3747d4e93b4f966cb81063f8.exe
Resource
win10v2004-20231215-en
General
-
Target
e1aa8f4c3747d4e93b4f966cb81063f8.exe
-
Size
1003KB
-
MD5
e1aa8f4c3747d4e93b4f966cb81063f8
-
SHA1
0f60ba5d192062aa422b0b5ee56f8737f8fd7380
-
SHA256
df2fec09e7d51ab44d9baed8993b239fc7840c11ed8d14c4ab30be1363b4dc71
-
SHA512
e5365622b726bce1e14cf0e7981f795d103e310e3c5db668e0617301960e7d918c508add384fe6bf84d5fde7f458fd24e4d4b3a7486461be64af43eebde679b5
-
SSDEEP
24576:9GS8qQBrVwKEshriAdnyfl43kLCGrNhiWtSCjHg:SnBrVwKEariMyt43kLCGrNhiW0CjA
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3004 e1aa8f4c3747d4e93b4f966cb81063f8.exe -
Executes dropped EXE 1 IoCs
pid Process 3004 e1aa8f4c3747d4e93b4f966cb81063f8.exe -
Loads dropped DLL 1 IoCs
pid Process 2148 e1aa8f4c3747d4e93b4f966cb81063f8.exe -
resource yara_rule behavioral1/memory/2148-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000b00000001224d-11.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2908 schtasks.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 e1aa8f4c3747d4e93b4f966cb81063f8.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 e1aa8f4c3747d4e93b4f966cb81063f8.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 e1aa8f4c3747d4e93b4f966cb81063f8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 e1aa8f4c3747d4e93b4f966cb81063f8.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2148 e1aa8f4c3747d4e93b4f966cb81063f8.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2148 e1aa8f4c3747d4e93b4f966cb81063f8.exe 3004 e1aa8f4c3747d4e93b4f966cb81063f8.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2148 wrote to memory of 3004 2148 e1aa8f4c3747d4e93b4f966cb81063f8.exe 29 PID 2148 wrote to memory of 3004 2148 e1aa8f4c3747d4e93b4f966cb81063f8.exe 29 PID 2148 wrote to memory of 3004 2148 e1aa8f4c3747d4e93b4f966cb81063f8.exe 29 PID 2148 wrote to memory of 3004 2148 e1aa8f4c3747d4e93b4f966cb81063f8.exe 29 PID 3004 wrote to memory of 2908 3004 e1aa8f4c3747d4e93b4f966cb81063f8.exe 30 PID 3004 wrote to memory of 2908 3004 e1aa8f4c3747d4e93b4f966cb81063f8.exe 30 PID 3004 wrote to memory of 2908 3004 e1aa8f4c3747d4e93b4f966cb81063f8.exe 30 PID 3004 wrote to memory of 2908 3004 e1aa8f4c3747d4e93b4f966cb81063f8.exe 30 PID 3004 wrote to memory of 2728 3004 e1aa8f4c3747d4e93b4f966cb81063f8.exe 32 PID 3004 wrote to memory of 2728 3004 e1aa8f4c3747d4e93b4f966cb81063f8.exe 32 PID 3004 wrote to memory of 2728 3004 e1aa8f4c3747d4e93b4f966cb81063f8.exe 32 PID 3004 wrote to memory of 2728 3004 e1aa8f4c3747d4e93b4f966cb81063f8.exe 32 PID 2728 wrote to memory of 2592 2728 cmd.exe 34 PID 2728 wrote to memory of 2592 2728 cmd.exe 34 PID 2728 wrote to memory of 2592 2728 cmd.exe 34 PID 2728 wrote to memory of 2592 2728 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1aa8f4c3747d4e93b4f966cb81063f8.exe"C:\Users\Admin\AppData\Local\Temp\e1aa8f4c3747d4e93b4f966cb81063f8.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\e1aa8f4c3747d4e93b4f966cb81063f8.exeC:\Users\Admin\AppData\Local\Temp\e1aa8f4c3747d4e93b4f966cb81063f8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\e1aa8f4c3747d4e93b4f966cb81063f8.exe" /TN ZBrUCVBB2555 /F3⤵
- Creates scheduled task(s)
PID:2908
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN ZBrUCVBB2555 > C:\Users\Admin\AppData\Local\Temp\m3Wgbfr.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN ZBrUCVBB25554⤵PID:2592
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5cc1e2930c7bc222cf3cb23ac8a334394
SHA1ce7854d28ee1caa4b55a9600f9cea2e92988e458
SHA25652c7d2dde8834e559d1362fba34d68b70fba1d2216152bb494f43629a34e8e4b
SHA512f90a1aa4f25d92f6b9d892e7599a985c910b42ebe81031bd64c1fea3bfbf601cb554f9b5415b547c5f2830f6bcf80e3fa822071063aa62077150a622ae51a953
-
Filesize
1003KB
MD591b373aa7224fcdab6317c2084f74c78
SHA1363da5925a580fb5ed62bd783780ce3e27ff86ec
SHA2560612c1543fb84ff52c8a45e1134c927dab6e8bc7fb93efbd1533c4ec697cc33b
SHA5121b7a83d26b5439df16a7c10c6a0053559453797a513e363cb68312fcbbfc729f94e24de88a36f4db63a7fa9861b1cc8d1f7e20e91f63f08376142a68ce6e032f