Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2023 13:15

General

  • Target

    9d63f9e3195c863b69bc21efceaa194b.exe

  • Size

    20.4MB

  • MD5

    9d63f9e3195c863b69bc21efceaa194b

  • SHA1

    969971e4ad9e8a66c2f50009402b52283423fc53

  • SHA256

    e1ca462adea3c72a6efe28fa237ab293a1ab2a2606c75a0ae6e7ac286158f6fa

  • SHA512

    a45684ac40f6641f9c6d3d363b3e0863f713f315ddb6b415b580b20c3eca5b1d01753d0c7199905c611cc224528986e49811bd7f9d7886b061e53604a530de4a

  • SSDEEP

    196608:6XxNoF6rgL76YyvC+F6rgruRLOzF6rgL76YyvC+F6rg:av6+gXhyvCY+gRZ+gXhyvCY+g

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d63f9e3195c863b69bc21efceaa194b.exe
    "C:\Users\Admin\AppData\Local\Temp\9d63f9e3195c863b69bc21efceaa194b.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3032
    • C:\Users\Admin\AppData\Local\Temp\9d63f9e3195c863b69bc21efceaa194b.exe
      C:\Users\Admin\AppData\Local\Temp\9d63f9e3195c863b69bc21efceaa194b.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:1212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\9d63f9e3195c863b69bc21efceaa194b.exe

    Filesize

    2.2MB

    MD5

    dbe39ed1a2a766c12654bf23ba58ca2e

    SHA1

    298a3e13588217b41b8c5d6f29b9db12e722a906

    SHA256

    5b2e4c1332114d0c1a2f02ca43e1d274ea6e48d46b6a36ca86dcb0e38cc8615a

    SHA512

    1900f8f6940dc21690e9fcb2d19bf2c02226e868ae257b807437b165b0a191ad0fb2d327d5ca9802962ac5f4c2339ad1c05663c719147e7f878f9b8fe9af7bcc

  • \Users\Admin\AppData\Local\Temp\9d63f9e3195c863b69bc21efceaa194b.exe

    Filesize

    2.9MB

    MD5

    dd90be7b4b6e29e7f24a94106d7f01e2

    SHA1

    f9934e69cf9aee898bc4db8a6a2dc46e43aa6599

    SHA256

    ad35de3e9703db6128e180985027c7cf49bc7859b174dc669463d74fd7277ab0

    SHA512

    ef09fb1e2c46d24f56774fb039dddd046617d7f41fd2af46a470a036d8e24e49516ee93138fbc2b22208a32e0e7e8ba854cae3a1c8db2f5425c5e646bd3f3b53

  • memory/1212-17-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/1212-18-0x0000000001FA0000-0x00000000021FA000-memory.dmp

    Filesize

    2.4MB

  • memory/1212-43-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/3032-0-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/3032-2-0x0000000002220000-0x000000000247A000-memory.dmp

    Filesize

    2.4MB

  • memory/3032-1-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/3032-16-0x00000000061A0000-0x0000000006B3E000-memory.dmp

    Filesize

    9.6MB

  • memory/3032-14-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/3032-42-0x00000000061A0000-0x0000000006B3E000-memory.dmp

    Filesize

    9.6MB