Analysis

  • max time kernel
    162s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/12/2023, 14:16

General

  • Target

    bd191cd3a93b9d850882098bf9a8ea55.exe

  • Size

    2.6MB

  • MD5

    bd191cd3a93b9d850882098bf9a8ea55

  • SHA1

    695939377bfd26312dc6848582cc9b6667a1ffb5

  • SHA256

    72a541f9427cef3e93479926c79272e72b81882877018688090c5b7e8335c38e

  • SHA512

    27dc05762ff5a3a2ff001996c4cf590689a28df832ceab16c0df2d4a2f929f85abe48e43615485720143c0688cd5969e9a9242e8d481cbc4365c45b27205ac5f

  • SSDEEP

    49152:NpfabHKNcrSjDbgH/xlhfci1cVaFlOdvKjuWay3:NpCSchFySi+3

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd191cd3a93b9d850882098bf9a8ea55.exe
    "C:\Users\Admin\AppData\Local\Temp\bd191cd3a93b9d850882098bf9a8ea55.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2472
    • C:\Users\Admin\AppData\Local\Temp\bd191cd3a93b9d850882098bf9a8ea55.exe
      C:\Users\Admin\AppData\Local\Temp\bd191cd3a93b9d850882098bf9a8ea55.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:4528

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\bd191cd3a93b9d850882098bf9a8ea55.exe

    Filesize

    2.5MB

    MD5

    83bb1ffb07dfcebdb679117a9573b2dd

    SHA1

    41d1cfed8c9bac673e1b1dba728b8c1561258736

    SHA256

    4152de420ef568a6162afeaf531f8fd591b66103a4f7c4f3e757c8df3a3ae00a

    SHA512

    62c6973598e06065e228ee5fffbcfae9e51374cc88647f1f85a1f16c45d8bbe8f02cb63a19f875c569cd417edac142944dd065d9228a1d8f9d41424f1805e876

  • memory/2472-0-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2472-1-0x0000000002220000-0x000000000247A000-memory.dmp

    Filesize

    2.4MB

  • memory/2472-2-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/2472-13-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/4528-14-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/4528-16-0x00000000021A0000-0x00000000023FA000-memory.dmp

    Filesize

    2.4MB

  • memory/4528-30-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB