Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2023, 08:44

General

  • Target

    7e51c44fc184970ff9cd7467cc352d01.exe

  • Size

    266KB

  • MD5

    7e51c44fc184970ff9cd7467cc352d01

  • SHA1

    8915d0983a603e17bdad564f65df1b322dd51fb9

  • SHA256

    b73b28d70b06e18497a510c31649f82bed26eaaf656f6db809d55795c0ae7ee7

  • SHA512

    e04fb9bf0a58bf757503333b25796f939bb26cc9e9766d0e78a7f6fba01c9fd6df1ada9eeb50e8609f74a7fd13cf139e1a4433f6128f731d288b89b7e4b906d6

  • SSDEEP

    6144:S237EqPsOxyC5mFbtMkBOZMHT2OGbffW4ZfG+BBYYfQgM81UvQ:S6IqZQv/HTG7WcfiOQGUo

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e51c44fc184970ff9cd7467cc352d01.exe
    "C:\Users\Admin\AppData\Local\Temp\7e51c44fc184970ff9cd7467cc352d01.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Users\Admin\AppData\Local\Temp\7e51c44fc184970ff9cd7467cc352d01.exe
      C:\Users\Admin\AppData\Local\Temp\7e51c44fc184970ff9cd7467cc352d01.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\7e51c44fc184970ff9cd7467cc352d01.exe

    Filesize

    266KB

    MD5

    2cd11c7db2d16a34757d25170ed27214

    SHA1

    0df6dc54c3fad41f4486ae0756d12d4541514b71

    SHA256

    028a7b234646950e444d64d4b1e814727c79f0620b9c70a11f9c5c86d084f2fe

    SHA512

    da1d822ab898044669744d14d59ad35f395b5fdca78b0da5002523ff46645417d2bf54819e391ea45057c32b89acf2ec882426bae55767f88f334da6811f2f99

  • memory/1972-0-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/1972-2-0x0000000000150000-0x0000000000171000-memory.dmp

    Filesize

    132KB

  • memory/1972-1-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1972-13-0x0000000001490000-0x0000000001516000-memory.dmp

    Filesize

    536KB

  • memory/1972-15-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2736-17-0x0000000000150000-0x0000000000171000-memory.dmp

    Filesize

    132KB

  • memory/2736-41-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB