Analysis

  • max time kernel
    137s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2023, 08:41

General

  • Target

    7e1f2861bc2c6452f243b5c1a5d1dc5d.exe

  • Size

    3.9MB

  • MD5

    7e1f2861bc2c6452f243b5c1a5d1dc5d

  • SHA1

    fb0f39266c4d0fe9a4f160414debca158f999a48

  • SHA256

    1a0f18815358ffff754e3c2a8b4bea3f03735265800c63ea55a7cc0cbeb5898a

  • SHA512

    231f57c8235abd32250c6281999279b077e75d740993f9169ee82b258dd39c039e1516f8e16340c6afb35ba56e5f47babc52eabee0bb07f90444dd00012593e0

  • SSDEEP

    98304:R7FdrbRVunJUrcakcibiqhw5vB5HycakcibiqhEV1JX9cakcibiqhw5vB5Hycakh:lrbRVGUrdlirSdydlirmLJX9dlirSdy+

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e1f2861bc2c6452f243b5c1a5d1dc5d.exe
    "C:\Users\Admin\AppData\Local\Temp\7e1f2861bc2c6452f243b5c1a5d1dc5d.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Users\Admin\AppData\Local\Temp\7e1f2861bc2c6452f243b5c1a5d1dc5d.exe
      C:\Users\Admin\AppData\Local\Temp\7e1f2861bc2c6452f243b5c1a5d1dc5d.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2324
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\7e1f2861bc2c6452f243b5c1a5d1dc5d.exe" /TN qm2lmOfce5f6 /F
        3⤵
        • Creates scheduled task(s)
        PID:2596
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN qm2lmOfce5f6 > C:\Users\Admin\AppData\Local\Temp\i0mw2oE.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2652
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN qm2lmOfce5f6
          4⤵
            PID:2676

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\7e1f2861bc2c6452f243b5c1a5d1dc5d.exe

      Filesize

      1.8MB

      MD5

      ea4e6f5447dad82f3b1bcd3cb4166574

      SHA1

      868bab169e3feb02ad043bd15be172850da9f01c

      SHA256

      0360bcf0ae9232aea7871b71378e71527da40f617cd1828e6615df2e5a4a6742

      SHA512

      c969c7acdfc2d0a9a90dc37ffacf1d1316d217c19c4a300f7ca788ad112c74053c663989d7f2ee4752bee6b71b5eb569ef0547395ede227fbc4e8dec44a25473

    • C:\Users\Admin\AppData\Local\Temp\i0mw2oE.xml

      Filesize

      1KB

      MD5

      27f188b0427f454bd1619eb61e35cc74

      SHA1

      709499bc717e4f644efba507d6c3bc4f98e18307

      SHA256

      dde8a7219ce48b21807958406e133013d241119fbc830a42688617ad6ceb5fbf

      SHA512

      4b378ae24ff308e9411e484b93d247d2d7ac12f1fa0692461471051ebf6cc97aa664b8d07f9096662b09927f321ecdf1f99fe7ff98478e00833910c5fcd66a01

    • \Users\Admin\AppData\Local\Temp\7e1f2861bc2c6452f243b5c1a5d1dc5d.exe

      Filesize

      1.4MB

      MD5

      1cd22ce99a965cba1ebf9ff053a0e890

      SHA1

      5fd44950fd7f0f9b4935809ca5aa45079a33c629

      SHA256

      0bf3b557d4073463a3f8ae77b14befb5b0a4b92fe8285e173e5b200941cfd89d

      SHA512

      847e8e5bb401936a7b37f94649329f2e53b2e46993f4b902457aceb0b967afd281e200424293deab819ddf47d98ac34dc67dd21db6c59194edf33dc4f3da6687

    • memory/2324-17-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2324-19-0x0000000001660000-0x00000000016DE000-memory.dmp

      Filesize

      504KB

    • memory/2324-25-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/2324-30-0x0000000000470000-0x00000000004DB000-memory.dmp

      Filesize

      428KB

    • memory/2324-44-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2888-0-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2888-1-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/2888-3-0x0000000022D90000-0x0000000022E0E000-memory.dmp

      Filesize

      504KB

    • memory/2888-16-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB