Analysis

  • max time kernel
    117s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2023, 14:33

General

  • Target

    c61db8d4629c37e91a53012b8a862e1b.exe

  • Size

    6.0MB

  • MD5

    c61db8d4629c37e91a53012b8a862e1b

  • SHA1

    4c96bd8ac242bcca8cb0d638186ead80b95b61ed

  • SHA256

    cc943fc41c3dce5851a7805b44bf7fc251ca0b8733cbbce58857e1bc4f23cbed

  • SHA512

    e005c82ddb1e8fbe878e46be3ebb538d73ec073c86531d045a9a0c06a7a65fdd5976cc80eaa37be6ed74bba2d573dc3ae36c71de494bf75b4df4e25e69d83660

  • SSDEEP

    98304:HFCAB4cakhXKihPmcak0l2Tq+JIrlcakhXKihPmcaka1OHMhU5MWLRyXutcakhXL:HFCAB4dQOd9gf2dQOdpm9ly2dQOd9gfv

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c61db8d4629c37e91a53012b8a862e1b.exe
    "C:\Users\Admin\AppData\Local\Temp\c61db8d4629c37e91a53012b8a862e1b.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2472
    • C:\Users\Admin\AppData\Local\Temp\c61db8d4629c37e91a53012b8a862e1b.exe
      C:\Users\Admin\AppData\Local\Temp\c61db8d4629c37e91a53012b8a862e1b.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:1764
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\c61db8d4629c37e91a53012b8a862e1b.exe" /TN MXmKXYLpa01b /F
        3⤵
        • Creates scheduled task(s)
        PID:2104
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN MXmKXYLpa01b > C:\Users\Admin\AppData\Local\Temp\HMrJwe.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2604
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN MXmKXYLpa01b
          4⤵
            PID:916

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\c61db8d4629c37e91a53012b8a862e1b.exe

      Filesize

      4.6MB

      MD5

      d016f10522b40035d93c8ca580be5c26

      SHA1

      db4639f750eb804a0eeb64a1a62cf358971bfc2d

      SHA256

      7f73e6c06ebe73212c9947e73a9fba30c0d642569d34a13e1d3e5000c4e90f02

      SHA512

      4684ce959ac1f15e8f7c5dd6708674ba7cab8482b0243a2b86401ba75d76cc8b119b1572840978a9b14b1e1bc1b4909ca386c3ffc176194a46e34496fcab7b32

    • \Users\Admin\AppData\Local\Temp\c61db8d4629c37e91a53012b8a862e1b.exe

      Filesize

      2.8MB

      MD5

      b21d6cc1bc5d6e95b7e8827ebad9e932

      SHA1

      70efae95c9c38e8b63742a4f59655a4951b522c2

      SHA256

      05b25f17be3564e549ac5204e000739223d056a798f817c56d46e786cacde3e1

      SHA512

      85c289ec5fafeb2cd28769b7233936d12ac9fffc5aaf8c1201e16d4bcf5a208da0bbc6fb124f47e7b6cd742ddc9598a4e53c313a1b1e487df6884089dae63e73

    • memory/1764-19-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/1764-31-0x0000000000330000-0x000000000039B000-memory.dmp

      Filesize

      428KB

    • memory/1764-26-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/1764-21-0x00000000002B0000-0x000000000032E000-memory.dmp

      Filesize

      504KB

    • memory/1764-54-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2472-0-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2472-15-0x0000000023AC0000-0x0000000023D1C000-memory.dmp

      Filesize

      2.4MB

    • memory/2472-16-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/2472-1-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/2472-2-0x00000000001A0000-0x000000000021E000-memory.dmp

      Filesize

      504KB