Resubmissions

20/11/2023, 02:36

231120-c3z3hsec4v 7

Analysis

  • max time kernel
    142s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231025-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2023, 02:36

General

  • Target

    SarangUpdate.exe

  • Size

    475KB

  • MD5

    e79f996b69d7fa546ed9235fdc0ee06d

  • SHA1

    b1616a455947ef3f29a4b5afdeda99369fc20bf8

  • SHA256

    ec7fcd3f4533d3514a9a42cbc41c40358eea47255bab1171146a5ccebaf20990

  • SHA512

    c0fd12425188d81be78be91facace2a036b81e29ffe4fde13b613a40bc20b39c656f1e0d91542b87973ffd2bc44e05b0354ecb1a488d391ee68f48cf43b44cf6

  • SSDEEP

    12288:QNrhTLpMP+R+QDCfA832AtBYmz6af0F7Z1QVjSOsJbc:QthTiP+ffCfB5Lf0F7Z1EDsBc

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SarangUpdate.exe
    "C:\Users\Admin\AppData\Local\Temp\SarangUpdate.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1464

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Xlpd 5 Update Log.txt

    Filesize

    351B

    MD5

    7fa2f5e5dbb835ebc202ff868462fb14

    SHA1

    416e0617202ff8278792238f5181c5237caefc61

    SHA256

    610abc4b5b2f49c08871e365ab5d5a2d2d9a383452798326b8858cdf1d8d5ad9

    SHA512

    365f84d3bfb2266dceee0b840764406eed70d5322b9fff6a95469a08ef7e57b9bdfc9a638f0b8094e72e2f2c70bfbe1525f7a738d072f9e46314492e931ed246

  • C:\Users\Admin\AppData\Local\Temp\_ir_tu2_temp_0\IRIMG2.JPG

    Filesize

    6KB

    MD5

    e39405e85e09f64ccde0f59392317dd3

    SHA1

    9c76db4b3d8c7972e7995ecfb1e3c47ee94fd14b

    SHA256

    cfd9677e1c0e10b1507f520c4ecd40f68db78154c0d4e6563403d540f3bf829f

    SHA512

    6733f330145b48d23c023c664090f4f240e9bbeb8368b486c8ee8682ec6a930b73275e24075648d1aa7e01db1ec7b7e259286917a006ba9af8fb7cba3439070a

  • memory/1464-0-0x0000000000400000-0x000000000053F000-memory.dmp

    Filesize

    1.2MB

  • memory/1464-18-0x0000000002C40000-0x0000000002C42000-memory.dmp

    Filesize

    8KB

  • memory/1464-19-0x0000000010000000-0x0000000010004000-memory.dmp

    Filesize

    16KB

  • memory/1464-23-0x0000000000400000-0x000000000053F000-memory.dmp

    Filesize

    1.2MB