Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    19-12-2023 11:16

General

  • Target

    12067e545d796c3de6ee33ec4f74a104.exe

  • Size

    532KB

  • MD5

    12067e545d796c3de6ee33ec4f74a104

  • SHA1

    b536953a7a9cee7bbcd5badf8ceb4734235476f6

  • SHA256

    f463e6939194c0b878a97b66c5f30201c45b0c13339c4945ab4c5ec1b2b3e032

  • SHA512

    8e95c6015a8e4ebca452b2d3d16ad43413e6088415dba3aa47a7520a3e4972aba38a87566c3f721b19066fde184b124aed58e0bda382370e12c5a9a3ed82acf5

  • SSDEEP

    12288:TB7C4cfMFuQI5OLpbhIX/CJirLtTle9e+QI5OLpbhIXD:TwLfMFrI5ysGotTyAI5y0

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12067e545d796c3de6ee33ec4f74a104.exe
    "C:\Users\Admin\AppData\Local\Temp\12067e545d796c3de6ee33ec4f74a104.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Users\Admin\AppData\Local\Temp\12067e545d796c3de6ee33ec4f74a104.exe
      C:\Users\Admin\AppData\Local\Temp\12067e545d796c3de6ee33ec4f74a104.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\12067e545d796c3de6ee33ec4f74a104.exe

    Filesize

    532KB

    MD5

    d68875d305f7b2ba8365c7e472ee2873

    SHA1

    882a970886b817f0aaeb3e671f205dbf18192c2b

    SHA256

    6db751e8fa5b3ca3ac12688c2999b6c89bbf265fe77b78033133bd04eb04658e

    SHA512

    e74c469fa3bb070c8b130570a8f098b9494f9a145ae531b755036b3c9dfe320b72a91a9ca8555a94d2dcf79f4746d2f320fb8b6c381140af4336b480a468f20b

  • memory/2368-1-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2368-3-0x0000000000150000-0x0000000000171000-memory.dmp

    Filesize

    132KB

  • memory/2368-0-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2368-5-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2368-16-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2368-15-0x0000000000190000-0x0000000000216000-memory.dmp

    Filesize

    536KB

  • memory/2584-19-0x0000000000150000-0x0000000000171000-memory.dmp

    Filesize

    132KB

  • memory/2584-33-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB