Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2023, 06:07

General

  • Target

    7444bbfb583649847786f591c4ce7f7a.exe

  • Size

    10.2MB

  • MD5

    7444bbfb583649847786f591c4ce7f7a

  • SHA1

    144c3eac90f2a2b2bf2bc70245f6747e098e6562

  • SHA256

    d1df2b7fd3270ce446202f6e3806156633ce4585c9a884d3011403c3455ca5a7

  • SHA512

    d8e2599dec972c908d08dd5a4ea3465364e79007703d1ed15dfb33e05d7d276d253a01eaade603b4766d062452328132ab59aa4387b9ea5ec45ebf6874df41f0

  • SSDEEP

    196608:GBPRsSr+it1aRnVEOK52HJKfHYJIjN+it1aRnVE:GBJRqMgdK5dfHYFMg

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7444bbfb583649847786f591c4ce7f7a.exe
    "C:\Users\Admin\AppData\Local\Temp\7444bbfb583649847786f591c4ce7f7a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2248
    • C:\Users\Admin\AppData\Local\Temp\7444bbfb583649847786f591c4ce7f7a.exe
      C:\Users\Admin\AppData\Local\Temp\7444bbfb583649847786f591c4ce7f7a.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7444bbfb583649847786f591c4ce7f7a.exe

    Filesize

    62KB

    MD5

    09fbcfcd2df903dd155e7ee97f0f3a5e

    SHA1

    43d31392fd65b90528491131bb9fdee9b5635c97

    SHA256

    2e5e8f5e347e87f4a05afd82601652ca378df4f5e76f5119b70c4e0a554d38d8

    SHA512

    f6282d5065cf55642d392be9194c423fed9453a41e218fb586be81337f3307ffef0699f16044b6c21beb15f404ea36766e6adca808376e143f9335064765d9c9

  • \Users\Admin\AppData\Local\Temp\7444bbfb583649847786f591c4ce7f7a.exe

    Filesize

    39KB

    MD5

    775ce50a3be45be98be24ddb7eedd9b2

    SHA1

    e3797e30221119411e2e9814606ed0bcf99242e5

    SHA256

    df4fe8ff0cd310832d10ad6bd8138bf471707dd13e83298ad15b542f19fe6447

    SHA512

    965bb85f388cf564d61c850506ac2c932cff63b135b4932d4214f97806e6430bc8d081bb041ffc3a59a0e8d1231f208437bece08824537e8aee685156d4544d3

  • memory/2248-1-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/2248-3-0x0000000002230000-0x000000000248A000-memory.dmp

    Filesize

    2.4MB

  • memory/2248-0-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2248-14-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/2248-17-0x0000000004D30000-0x00000000056CE000-memory.dmp

    Filesize

    9.6MB

  • memory/2248-43-0x0000000004D30000-0x00000000056CE000-memory.dmp

    Filesize

    9.6MB

  • memory/2796-20-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2796-22-0x00000000021B0000-0x000000000240A000-memory.dmp

    Filesize

    2.4MB

  • memory/2796-44-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB