Analysis

  • max time kernel
    142s
  • max time network
    185s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2023, 14:09

General

  • Target

    b8b7534bb14badf8e6cd28d3900a72de.exe

  • Size

    2.0MB

  • MD5

    b8b7534bb14badf8e6cd28d3900a72de

  • SHA1

    39440f72dbf999b146159a0f50ec327afc6a26c3

  • SHA256

    fbd135073762e52897d66832a7e57babf93e6b2edf9128e7a82ff9ede0f3a79e

  • SHA512

    58dc13a3827c8a2b34ebae12c3bce4d99ef0ee58441fb415d1d46dc3df58c380a989d4b642dc61b550129da6e31fce1864f59202496f6e1237b34f4d4634879f

  • SSDEEP

    49152:YbVCxoKtv/TZtupu1WuGfB7it4NaLRXB8MRBfY7bupu1WuGfB7it:Yb8xoUTZtupIWuGfB7W44LL8MRS7bup0

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b8b7534bb14badf8e6cd28d3900a72de.exe
    "C:\Users\Admin\AppData\Local\Temp\b8b7534bb14badf8e6cd28d3900a72de.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2860
    • C:\Users\Admin\AppData\Local\Temp\b8b7534bb14badf8e6cd28d3900a72de.exe
      C:\Users\Admin\AppData\Local\Temp\b8b7534bb14badf8e6cd28d3900a72de.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2264
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\b8b7534bb14badf8e6cd28d3900a72de.exe" /TN WAgLRKqP8c0d /F
        3⤵
        • Creates scheduled task(s)
        PID:1656
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN WAgLRKqP8c0d > C:\Users\Admin\AppData\Local\Temp\TTD9weLBY.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2612
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN WAgLRKqP8c0d
          4⤵
            PID:2688

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\TTD9weLBY.xml

      Filesize

      1KB

      MD5

      322f9dbd27c3dfadd7a13486abdbb68a

      SHA1

      b9b29714f98e3075cc0d34d610bf13650b2222bd

      SHA256

      b97c2ce6b33b5791447c9b44feea981e8a7e08d415cf0458b0556b7ff631802a

      SHA512

      98aae35d8e45b51de612fe94107eaf20a49075dbd54344527a25dff246bda57b571ad28969eca51045672ebaf5efc2c43b33e879ef4352956252384a317f77cd

    • C:\Users\Admin\AppData\Local\Temp\b8b7534bb14badf8e6cd28d3900a72de.exe

      Filesize

      1.3MB

      MD5

      db9c6421cda23ba9fd0e2359cd05e1c3

      SHA1

      87c62bcd20f3eba6c2418ca5cd3defcd5b0b9400

      SHA256

      fd5bb3da2a3b0557cb58a72257294b4ff94cc032b90fc6e79542990d09822dcf

      SHA512

      10648e15091921579f6a6fcf7f200dabd26fb33e621ac66e385f16134c6299c67c0aa2818eb77b3cd272d2b45d33ac76eb8a41937af4f988fefb1d3c94d970a1

    • \Users\Admin\AppData\Local\Temp\b8b7534bb14badf8e6cd28d3900a72de.exe

      Filesize

      805KB

      MD5

      6183e271130486bd5f72be8d5d8e69cd

      SHA1

      046415b38b01f6c9353a158228506a610a40ed91

      SHA256

      021d1708ccf0548056f9e9fee55f0e3bbfaf562eda038b831c7f9df5b8ef93ab

      SHA512

      e3c3cb09844460b42455d6b58a02d93a0472ecb2464469506c69b41f44b47518e2668baf57f4af16dd505fb3c9dbfbeb7dd39d632fb810ada1de65dbd27c98ff

    • memory/2264-18-0x00000000016D0000-0x000000000174E000-memory.dmp

      Filesize

      504KB

    • memory/2264-20-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2264-30-0x0000000000470000-0x00000000004DB000-memory.dmp

      Filesize

      428KB

    • memory/2264-25-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/2264-53-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2860-0-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2860-1-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/2860-2-0x0000000022D90000-0x0000000022E0E000-memory.dmp

      Filesize

      504KB

    • memory/2860-16-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB