Analysis

  • max time kernel
    28s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2023, 05:43

General

  • Target

    84df3ba7db93d74885c9889c987b77e85734ef446079a58385350518d72920ca.exe

  • Size

    815KB

  • MD5

    53edef7bcda0d2a8c218b1c98d963a1b

  • SHA1

    892ccc4dbf22ca383bdcc597b0da66394856bb65

  • SHA256

    84df3ba7db93d74885c9889c987b77e85734ef446079a58385350518d72920ca

  • SHA512

    c417f5c660f9d679d1e8c1c2b27a91ef7360b8f6ae78be9ef4a17e0d2a8967b671bcad8f6f9f9e02ca775bd2d46e5c6783d16458c2265ea8541864ac104d6009

  • SSDEEP

    24576:fO1LHcsboAcntImlnm5bGFZ0XkAck+ffCUyCBZY3/:G2Acn9CkZ0X2hff/yC3G/

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\84df3ba7db93d74885c9889c987b77e85734ef446079a58385350518d72920ca.exe
    "C:\Users\Admin\AppData\Local\Temp\84df3ba7db93d74885c9889c987b77e85734ef446079a58385350518d72920ca.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1288
    • C:\Windows\SysWOW64\cliconfg.exe
      "C:\Windows\SysWOW64\cliconfg.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1120
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 92
        3⤵
        • Program crash
        PID:2628
    • C:\Windows\SysWOW64\OptionalFeatures.exe
      "C:\Windows\SysWOW64\OptionalFeatures.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2536
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2536 -s 188
        3⤵
        • Program crash
        PID:2032
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\84DF3B~1.EXE > nul
      2⤵
        PID:2428

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1120-7-0x0000000000240000-0x0000000000348000-memory.dmp

            Filesize

            1.0MB

          • memory/1120-2-0x0000000000240000-0x0000000000348000-memory.dmp

            Filesize

            1.0MB

          • memory/1120-4-0x0000000000240000-0x0000000000348000-memory.dmp

            Filesize

            1.0MB

          • memory/1120-6-0x0000000000240000-0x0000000000348000-memory.dmp

            Filesize

            1.0MB

          • memory/1288-32-0x0000000010000000-0x00000000100F8000-memory.dmp

            Filesize

            992KB

          • memory/1288-34-0x0000000010000000-0x00000000100F8000-memory.dmp

            Filesize

            992KB

          • memory/1288-16-0x0000000000120000-0x0000000000258000-memory.dmp

            Filesize

            1.2MB

          • memory/1288-17-0x0000000010000000-0x00000000100F8000-memory.dmp

            Filesize

            992KB

          • memory/1288-25-0x0000000000120000-0x0000000000258000-memory.dmp

            Filesize

            1.2MB

          • memory/1288-27-0x0000000010000000-0x00000000100F8000-memory.dmp

            Filesize

            992KB

          • memory/1288-29-0x0000000010000000-0x00000000100F8000-memory.dmp

            Filesize

            992KB

          • memory/1288-30-0x0000000010000000-0x00000000100F8000-memory.dmp

            Filesize

            992KB

          • memory/1288-0-0x0000000000120000-0x0000000000258000-memory.dmp

            Filesize

            1.2MB

          • memory/1288-48-0x0000000003B00000-0x0000000003BF9000-memory.dmp

            Filesize

            996KB

          • memory/1288-35-0x0000000010000000-0x00000000100F8000-memory.dmp

            Filesize

            992KB

          • memory/1288-36-0x0000000010000000-0x00000000100F8000-memory.dmp

            Filesize

            992KB

          • memory/1288-37-0x0000000010000000-0x00000000100F8000-memory.dmp

            Filesize

            992KB

          • memory/1288-39-0x0000000010000000-0x00000000100F8000-memory.dmp

            Filesize

            992KB

          • memory/1288-42-0x0000000010000000-0x00000000100F8000-memory.dmp

            Filesize

            992KB

          • memory/1288-44-0x0000000010000000-0x00000000100F8000-memory.dmp

            Filesize

            992KB

          • memory/1288-45-0x0000000000120000-0x0000000000258000-memory.dmp

            Filesize

            1.2MB

          • memory/1288-46-0x0000000010000000-0x00000000100F8000-memory.dmp

            Filesize

            992KB

          • memory/1288-47-0x0000000010000000-0x00000000100F8000-memory.dmp

            Filesize

            992KB

          • memory/2536-14-0x0000000000210000-0x0000000000318000-memory.dmp

            Filesize

            1.0MB