Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2023, 05:02

General

  • Target

    6d2620314cd5dc068cf0325b44ef5a27.exe

  • Size

    1.6MB

  • MD5

    6d2620314cd5dc068cf0325b44ef5a27

  • SHA1

    7c18be28044b656267fa5466e354eb6dca13a9c1

  • SHA256

    6473ac10290b6e72337abfec95f64d94dd1e8ca4d6e85b6c50bdc0d0a54bfd17

  • SHA512

    02d492f0d099a9ffe338357eee26fd5d31f2d92d664171c3ba704a4258161fc84282e991be8ab32f99edbe616c2b7920de99bc83ffc3272162cd5658bf0301d3

  • SSDEEP

    49152:4csJnfUcCQ6cakLz0Tdl5bVQNK7cakLz0O:4vJnfUcCQ6cakcTdzVQNK7cakcO

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d2620314cd5dc068cf0325b44ef5a27.exe
    "C:\Users\Admin\AppData\Local\Temp\6d2620314cd5dc068cf0325b44ef5a27.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Users\Admin\AppData\Local\Temp\6d2620314cd5dc068cf0325b44ef5a27.exe
      C:\Users\Admin\AppData\Local\Temp\6d2620314cd5dc068cf0325b44ef5a27.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:3032
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\6d2620314cd5dc068cf0325b44ef5a27.exe" /TN qm2lmOfce5f6 /F
        3⤵
        • Creates scheduled task(s)
        PID:2644
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN qm2lmOfce5f6 > C:\Users\Admin\AppData\Local\Temp\Ddmse8.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2692
  • C:\Windows\SysWOW64\schtasks.exe
    schtasks.exe /Query /XML /TN qm2lmOfce5f6
    1⤵
      PID:2568

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\6d2620314cd5dc068cf0325b44ef5a27.exe

      Filesize

      725KB

      MD5

      58ab314c21a1d9882308bb5c98ba02ed

      SHA1

      fd45494774880ffc0ff37efd77b5539035d0134f

      SHA256

      7d284b48ed8de651fec8ae957bdbbfa0ac3fb243d004991cde96c5aaf2783a9f

      SHA512

      bd06dd60d06d90161204003800690a96f3fd77a951af769d8e9d6c64eab20cb72298812f2dc440375fea5db659d7cee9db7345e052939d4a8df7b6a6fbd7683f

    • C:\Users\Admin\AppData\Local\Temp\Ddmse8.xml

      Filesize

      1KB

      MD5

      ca94368193ecc714aec83da87a2c0e9b

      SHA1

      34fbb73f71f58c5932ca1cdbf4f274c6546b665d

      SHA256

      7d0b9817cad089c4616a292dc75e60159397e4e14b922d965e1e3be45c22a5b6

      SHA512

      2bfe36464292b11ce557e5834949a5dd0c204a502bc741433f1334347b14f81791dd36c7f5515ef9a93bf999901526e1f435248e0191bc35f69ff20d400f15e8

    • \Users\Admin\AppData\Local\Temp\6d2620314cd5dc068cf0325b44ef5a27.exe

      Filesize

      1016KB

      MD5

      43170c7da223a68c95dd721ecd8ab115

      SHA1

      7326c279141c69de5f1c9228f2419901783f9a90

      SHA256

      2d274a9fa244b2c9a8776a7394acd9fc6d4a7a734f492eb5efe7596b7daab126

      SHA512

      9efc2d3770c3a291f23bb2c27c934a4c8c9e6f835329049a89048c39f7991d82d58dc0417fd2f42c5073e6724d458e259c9649f431d51d913b06c62ef2089477

    • memory/2220-2-0x00000000001A0000-0x000000000021E000-memory.dmp

      Filesize

      504KB

    • memory/2220-1-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/2220-17-0x0000000023080000-0x00000000232DC000-memory.dmp

      Filesize

      2.4MB

    • memory/2220-16-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/2220-0-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/3032-19-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/3032-26-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/3032-31-0x00000000002C0000-0x000000000032B000-memory.dmp

      Filesize

      428KB

    • memory/3032-21-0x00000000001A0000-0x000000000021E000-memory.dmp

      Filesize

      504KB

    • memory/3032-45-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB