Analysis

  • max time kernel
    137s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2023, 04:17

General

  • Target

    62248fe8856ecdd6200bbda5636976fe.exe

  • Size

    133KB

  • MD5

    62248fe8856ecdd6200bbda5636976fe

  • SHA1

    8a5766e20252b72145effe77ce72132fffad7219

  • SHA256

    b3a10ff1241efa94a6baa9f0c2844b6d3450a818a7caa0c8de7a2bd49bfce362

  • SHA512

    7fc749c71fbee0ef14495edb0c23891f6b549ce153f77016f90904e3de017cf998aa906505352a6cbc4e0cd9647e1fc5dfebbceb334e128258c9f0ee874bc96d

  • SSDEEP

    3072:cIFrpcoX4xBLl8ixyWzQiKimIYlP1WFHE9nDy6mRAIZ2m5GbnQ:7FVD79BlM0n9INYLTQ

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\62248fe8856ecdd6200bbda5636976fe.exe
    C:\Users\Admin\AppData\Local\Temp\62248fe8856ecdd6200bbda5636976fe.exe
    1⤵
    • Deletes itself
    • Executes dropped EXE
    • Modifies system certificate store
    • Suspicious use of UnmapMainImage
    PID:2088
  • C:\Users\Admin\AppData\Local\Temp\62248fe8856ecdd6200bbda5636976fe.exe
    "C:\Users\Admin\AppData\Local\Temp\62248fe8856ecdd6200bbda5636976fe.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2404

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\62248fe8856ecdd6200bbda5636976fe.exe

          Filesize

          85KB

          MD5

          850ca5f9687fc6b5d33b01b9a9a11a34

          SHA1

          d43370bc25c8152a8b895d7e2a6c89f0d5976538

          SHA256

          77c164f181db5508284571440ad4a91a2f9812b5162ed9944bcf5261b97e2cf4

          SHA512

          0d5128ad6b39b3da04497688821eb863d1db2648cd0a9b3fca32bc231c4f538f3636308926f0ec6848bc480bf47ab2461a6a2dfcad66f45bff9fca6a02f7ad59

        • \Users\Admin\AppData\Local\Temp\62248fe8856ecdd6200bbda5636976fe.exe

          Filesize

          92KB

          MD5

          b6bb6a7a040188c1dd3eeca7ab0ff3cc

          SHA1

          1852f5b53c222addc988b93730dd9a9861c6649a

          SHA256

          06605c2981c15426767db66c1c526f3e4b06eaeb8805882546f984a8370df1b5

          SHA512

          f3cf6512fa80ba5ad60d8f509bd80217c7272631a682791116c80b6e18fed316bf0f21836fc631762cd54a7310ef44fe72c63b91e0371195e89cf38b63af8fea

        • memory/2088-18-0x0000000000400000-0x0000000000486000-memory.dmp

          Filesize

          536KB

        • memory/2088-20-0x0000000000150000-0x0000000000171000-memory.dmp

          Filesize

          132KB

        • memory/2088-42-0x0000000000400000-0x0000000000486000-memory.dmp

          Filesize

          536KB

        • memory/2404-1-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2404-0-0x0000000000400000-0x0000000000486000-memory.dmp

          Filesize

          536KB

        • memory/2404-15-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2404-16-0x00000000001B0000-0x0000000000236000-memory.dmp

          Filesize

          536KB

        • memory/2404-5-0x0000000000150000-0x0000000000171000-memory.dmp

          Filesize

          132KB