Analysis

  • max time kernel
    141s
  • max time network
    201s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/12/2023, 04:09

General

  • Target

    60e5e83e9ca430932a5e3a15d8b7fb91.exe

  • Size

    133KB

  • MD5

    60e5e83e9ca430932a5e3a15d8b7fb91

  • SHA1

    54e1039a82c122a3f7c23da1afb531eb18805375

  • SHA256

    2d14bb939146dbdbfb9e4f6c5ba0d56f374ad81dfec4df6b8b9b88d2b695f9a2

  • SHA512

    f3fc1476828aa156b807eefdb54f27487cedd0055d210f2339bf4ffe43af91fa735892227b1b6c99eaa735d2f922879d6d4b8575fc5c7e2dec8799c50f11baee

  • SSDEEP

    3072:iMjoESSgUMm8olNN+dYZWM1h9mlwuENHw9bQ:djoES9QRv+YWM1hUlMapQ

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\60e5e83e9ca430932a5e3a15d8b7fb91.exe
    "C:\Users\Admin\AppData\Local\Temp\60e5e83e9ca430932a5e3a15d8b7fb91.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:456
    • C:\Users\Admin\AppData\Local\Temp\60e5e83e9ca430932a5e3a15d8b7fb91.exe
      C:\Users\Admin\AppData\Local\Temp\60e5e83e9ca430932a5e3a15d8b7fb91.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:4800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\60e5e83e9ca430932a5e3a15d8b7fb91.exe

    Filesize

    133KB

    MD5

    f9582a9b5c8a32d9540b766e616c3237

    SHA1

    125af68d73cc6e29fd2676a713d2fcb04a58ebcc

    SHA256

    86ef76bfd673b20abbc2eb8dc56a15510d003bfa9e4d119816f06035ba3d6e63

    SHA512

    cbbadaf2d9609c1e48cf8283cbcc9db392e560a67cf7d35c7c30997d8233bb545486bd56c78ba076bf35e38a56f13f30094a5b81e32ed1c1de9a7231187f62a4

  • memory/456-0-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/456-1-0x00000000000F0000-0x0000000000111000-memory.dmp

    Filesize

    132KB

  • memory/456-2-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/456-13-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4800-15-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4800-14-0x00000000000D0000-0x00000000000F1000-memory.dmp

    Filesize

    132KB

  • memory/4800-17-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/4800-30-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB