Analysis

  • max time kernel
    140s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    08/08/2023, 18:18

General

  • Target

    5f4c28c73d5f6d0e68a1dee9f1bee686266ec3ceba0d8a14bf148caa2b801fc1.exe

  • Size

    776KB

  • MD5

    53b86647720271b9b6e71bc727fb8cea

  • SHA1

    8cc9f65df25750dd209240982e9a04fec3d6916d

  • SHA256

    5f4c28c73d5f6d0e68a1dee9f1bee686266ec3ceba0d8a14bf148caa2b801fc1

  • SHA512

    bb46df0c01aed561135f4134c9ed3b0b0e535d15da2a503e9e571d8062f6e2e667deb60a1809e116cf567343a66d7dc1d3b76cb024a1338691c95d1fa1de3110

  • SSDEEP

    24576:Q32aTiKnVm2RJSTCiikaUM10uX5bOBgPq:QLeSmZK10uXWgi

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 16 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f4c28c73d5f6d0e68a1dee9f1bee686266ec3ceba0d8a14bf148caa2b801fc1.exe
    "C:\Users\Admin\AppData\Local\Temp\5f4c28c73d5f6d0e68a1dee9f1bee686266ec3ceba0d8a14bf148caa2b801fc1.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:2732

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\78VIACC2\news.sina.com[1].xml

          Filesize

          13B

          MD5

          c1ddea3ef6bbef3e7060a1a9ad89e4c5

          SHA1

          35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

          SHA256

          b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

          SHA512

          6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\MPQTYZ7B\d6.sina.com[1].xml

          Filesize

          96B

          MD5

          0649869e367c5d21a3fadb2f258feb69

          SHA1

          84fcd5f1811a28477652f1831d46d11eb600d0aa

          SHA256

          f5b15c23cc72cf6000136fce45c53abb7cbbb1ab0e3e9c6a1f94e09a9c4423f2

          SHA512

          85cb3d12ef676a6d08cde80c19d023a60cb651403e0501ecf1d5657b14e5c1cf92eee23bad1c2f993f7c7f2b1369ae19c5256fa13b6558886f185adf90eb0de4

        • C:\Users\Admin\AppData\Local\Temp\config.ini

          Filesize

          106B

          MD5

          719376da11885c80758bbcb288b11495

          SHA1

          f80146accd40a18c3b539002a2a161c589be4783

          SHA256

          d0fb53249a08b47a806db7ee85546bfe4be01e01058b0bead9298cc334242e09

          SHA512

          3c1d7054176051919f4a54856c977a75edb68eb7984fff0b61748276705c1fe732cc52c4b61c8ac2b411ded63fcfa7494dbc799c5856cbfe188b5cbcfb7676a6

        • C:\Users\Admin\AppData\Local\Temp\config.ini

          Filesize

          51B

          MD5

          7f3caf47dde94a9684497dfe2aaad46d

          SHA1

          3ad5bc979213d4f95a5585d73f9786f3e9730242

          SHA256

          afcaa0eb594a76bcae5ef45151156d71ff070c198f372f09c3cacc4caffc1d21

          SHA512

          a5a40534a9ca46ae6c9bc5dda1574f6166cce8228ecb88802f91c1105bbde2c7546edf492deff4d3a3836adb5584a2e2f51accdcdd5eea476db3c87ba3d64e7e

        • C:\Users\Admin\AppData\Local\Temp\config.ini

          Filesize

          84B

          MD5

          ed87ed2d66dbbb49f9510dccbefb8e87

          SHA1

          a839b0e28830da2fa1119d6027a1d837c2218566

          SHA256

          cc29c6cac1d821b475723c0f2e625c9b414ceeea49f8c669c380000e73773846

          SHA512

          15d61774597e9a28250bfbcade0fc207019c133284481f44c954203bdbfc918a5fde2e9780be956da1242a64b63257851de75538a2c544461bbad31a839cf902

        • memory/2732-245-0x0000000000400000-0x000000000067C000-memory.dmp

          Filesize

          2.5MB

        • memory/2732-258-0x0000000000400000-0x000000000067C000-memory.dmp

          Filesize

          2.5MB

        • memory/2732-217-0x0000000000400000-0x000000000067C000-memory.dmp

          Filesize

          2.5MB

        • memory/2732-218-0x0000000003A80000-0x0000000003A90000-memory.dmp

          Filesize

          64KB

        • memory/2732-228-0x0000000000400000-0x000000000067C000-memory.dmp

          Filesize

          2.5MB

        • memory/2732-54-0x0000000000400000-0x000000000067C000-memory.dmp

          Filesize

          2.5MB

        • memory/2732-76-0x0000000003A80000-0x0000000003A90000-memory.dmp

          Filesize

          64KB

        • memory/2732-256-0x0000000000400000-0x000000000067C000-memory.dmp

          Filesize

          2.5MB

        • memory/2732-257-0x0000000000400000-0x000000000067C000-memory.dmp

          Filesize

          2.5MB

        • memory/2732-216-0x0000000000400000-0x000000000067C000-memory.dmp

          Filesize

          2.5MB

        • memory/2732-260-0x0000000000400000-0x000000000067C000-memory.dmp

          Filesize

          2.5MB

        • memory/2732-261-0x0000000000400000-0x000000000067C000-memory.dmp

          Filesize

          2.5MB

        • memory/2732-262-0x0000000000400000-0x000000000067C000-memory.dmp

          Filesize

          2.5MB

        • memory/2732-263-0x0000000000400000-0x000000000067C000-memory.dmp

          Filesize

          2.5MB

        • memory/2732-264-0x0000000000400000-0x000000000067C000-memory.dmp

          Filesize

          2.5MB

        • memory/2732-265-0x0000000000400000-0x000000000067C000-memory.dmp

          Filesize

          2.5MB

        • memory/2732-266-0x0000000000400000-0x000000000067C000-memory.dmp

          Filesize

          2.5MB

        • memory/2732-267-0x0000000000400000-0x000000000067C000-memory.dmp

          Filesize

          2.5MB