Analysis

  • max time kernel
    143s
  • max time network
    170s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2023, 13:26

General

  • Target

    a2f2f540a0e5055b8cd52fda958a7583.exe

  • Size

    5.1MB

  • MD5

    a2f2f540a0e5055b8cd52fda958a7583

  • SHA1

    5c8430f384769517e9f21cd3960fc2685bb32dce

  • SHA256

    791382842aa82cfbd3858724811f2866d3b609e18ab7254fde374a67f2f39a74

  • SHA512

    3031bab0e45e7d89466c5b3985cce74f1b5f14a1e1aafe982836474f3847f9836bc74cb32b85cefc41633223e3fdd054c27685cef1800b787200edcaf5765078

  • SSDEEP

    98304:g4swuE9L79pbF3S11qronI0Iy5fKP7grvYLS3:fswuiRqa0j9

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2f2f540a0e5055b8cd52fda958a7583.exe
    "C:\Users\Admin\AppData\Local\Temp\a2f2f540a0e5055b8cd52fda958a7583.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2756
    • C:\Users\Admin\AppData\Local\Temp\a2f2f540a0e5055b8cd52fda958a7583.exe
      C:\Users\Admin\AppData\Local\Temp\a2f2f540a0e5055b8cd52fda958a7583.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\a2f2f540a0e5055b8cd52fda958a7583.exe

    Filesize

    401KB

    MD5

    0c05a88d8b1d7667f6d42698382840f9

    SHA1

    ebc72bd96b12d2f05d169691e332937a58b958d2

    SHA256

    93503c26f76774596c22b1e252773d758e603c6a35129eefbbf33bd7d953fc5c

    SHA512

    95dabbd263869dae5963c2e1680ccd46e443049f678b37fc5a52ba58aa003a6768aed3fee05a5fb8fe6b7efae1e47747fdba4292d8f5f7143fbe5b885b54cb8b

  • \Users\Admin\AppData\Local\Temp\a2f2f540a0e5055b8cd52fda958a7583.exe

    Filesize

    415KB

    MD5

    db9df4f35eb14d8deadef54d071c3387

    SHA1

    e4a4c2a36a1d1b3632cc90340f85d9c55073cd4a

    SHA256

    740f1e04e1c9c89b80a2e4b5e581afc8435c742353641b49d5fae47837a3f4d1

    SHA512

    ff0c5b654a9d5467454ac0fba3773f46b9295ba5c6d80204937d30cd92f0ff0e5db41f11a587d9886e6667aa0c8eaa97786a74d957a7351e1bed726c4abfd5dc

  • memory/2644-20-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2644-22-0x0000000002290000-0x00000000024EA000-memory.dmp

    Filesize

    2.4MB

  • memory/2644-44-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2756-0-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2756-1-0x0000000001FA0000-0x00000000021FA000-memory.dmp

    Filesize

    2.4MB

  • memory/2756-2-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/2756-16-0x0000000004060000-0x00000000049FE000-memory.dmp

    Filesize

    9.6MB

  • memory/2756-14-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/2756-43-0x0000000004060000-0x00000000049FE000-memory.dmp

    Filesize

    9.6MB