Analysis

  • max time kernel
    155s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/12/2023, 14:51

General

  • Target

    cd336043df26ee0f272999e3992d05a5.exe

  • Size

    3.9MB

  • MD5

    cd336043df26ee0f272999e3992d05a5

  • SHA1

    f6b344e3161aa97fa688df927b39e1544f0309a5

  • SHA256

    c8eb20f99cbff96d75cb38c3c769f05f34c7f3438bc69344e5fbac51addb1b17

  • SHA512

    2b56fafc9931bc21cccde1757c9aa03943ca39ba76364e142b3cdac636d7f32bd9d77bddde29592c86bc47116319440fe5ff0f8f8f447b6ba4c124b04afc3d0d

  • SSDEEP

    98304:mWPkBf9invbpaoX3uyFBsPB2jWghGCeoX3uyFBsPuA3ff2goX3uyFBsPB2jWghGD:m+kx9VILFBsPBu8ILFBsPxHRILFBsPB5

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Program crash 5 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd336043df26ee0f272999e3992d05a5.exe
    "C:\Users\Admin\AppData\Local\Temp\cd336043df26ee0f272999e3992d05a5.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4740
    • C:\Users\Admin\AppData\Local\Temp\cd336043df26ee0f272999e3992d05a5.exe
      C:\Users\Admin\AppData\Local\Temp\cd336043df26ee0f272999e3992d05a5.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:4876
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\cd336043df26ee0f272999e3992d05a5.exe" /TN BLiB1zkTf55f /F
        3⤵
        • Creates scheduled task(s)
        PID:1560
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN BLiB1zkTf55f > C:\Users\Admin\AppData\Local\Temp\csqqfD.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3936
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN BLiB1zkTf55f
          4⤵
            PID:3728
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 616
          3⤵
          • Program crash
          PID:4956
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 632
          3⤵
          • Program crash
          PID:1228
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 640
          3⤵
          • Program crash
          PID:3156
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 732
          3⤵
          • Program crash
          PID:3620
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 628
          3⤵
          • Program crash
          PID:4380
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4876 -ip 4876
      1⤵
        PID:2404
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4876 -ip 4876
        1⤵
          PID:2316
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4876 -ip 4876
          1⤵
            PID:640
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4876 -ip 4876
            1⤵
              PID:768
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4876 -ip 4876
              1⤵
                PID:384

              Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\cd336043df26ee0f272999e3992d05a5.exe

                      Filesize

                      807KB

                      MD5

                      b622c614c5236cae55de14c300883df9

                      SHA1

                      37aee7365dc64e11c60a2f41b29374639b44aeeb

                      SHA256

                      46dfd90a452f92aad6d43dba41fc3cf19989e355b8aa2a2bc4d62f3e9f46b006

                      SHA512

                      5210af2661d47a1f18afdf9b13716230f2c6aacf3ccd49fb02b55052ebba04e474cd94a7e4d2a5dd4a7ea38335af3a5896b996d166ffae6747c2cd867ae2b91c

                    • C:\Users\Admin\AppData\Local\Temp\csqqfD.xml

                      Filesize

                      1KB

                      MD5

                      6da19f0ed0abbfed7e2fe638fa4b0331

                      SHA1

                      2149fd951d553760b93624bb03ef7f479eef760c

                      SHA256

                      1dfd090b96c5afa01ddadc23f7962d12f3cfb789de548d8caea9acacab12763f

                      SHA512

                      c6d182faf1f139b810374b43ffe56f97163e05656d785379e78ec535854fca2266fb7a8e33c184c1cf29a8785ec5e3eb346714de0a358df2288d992921d33617

                    • memory/4740-0-0x0000000000400000-0x000000000065C000-memory.dmp

                      Filesize

                      2.4MB

                    • memory/4740-1-0x0000000000400000-0x000000000046B000-memory.dmp

                      Filesize

                      428KB

                    • memory/4740-2-0x0000000025010000-0x000000002508E000-memory.dmp

                      Filesize

                      504KB

                    • memory/4740-13-0x0000000000400000-0x000000000046B000-memory.dmp

                      Filesize

                      428KB

                    • memory/4876-14-0x0000000000400000-0x000000000065C000-memory.dmp

                      Filesize

                      2.4MB

                    • memory/4876-17-0x0000000025060000-0x00000000250DE000-memory.dmp

                      Filesize

                      504KB

                    • memory/4876-23-0x0000000000400000-0x000000000045B000-memory.dmp

                      Filesize

                      364KB

                    • memory/4876-22-0x0000000000470000-0x00000000004DB000-memory.dmp

                      Filesize

                      428KB

                    • memory/4876-40-0x0000000000400000-0x000000000065C000-memory.dmp

                      Filesize

                      2.4MB