Analysis

  • max time kernel
    25s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2023, 15:36

General

  • Target

    dac363894267c5d4fc1dcd2c183aa3db.exe

  • Size

    11.0MB

  • MD5

    dac363894267c5d4fc1dcd2c183aa3db

  • SHA1

    636f3ce05856035a03c3661c966cae6d36a587f1

  • SHA256

    cef9622b86e450dc489852b8a68e768fc7a105552988ecd4a131975ac647549e

  • SHA512

    e9c4ac38b0f209e620206d8aac67d083482466fefba31235a39143aa7626e5e0b266c8f86d5202f72482292d063ff8a2ac5e7efabd06fb20059ae3c5d3bd2019

  • SSDEEP

    98304:fDllpr78EOfllI35mCckFR+vicS43s0KgDLYws35mCckFR+vicS43:fDllprw1fli33FR+6c9owM33FR+6c

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dac363894267c5d4fc1dcd2c183aa3db.exe
    "C:\Users\Admin\AppData\Local\Temp\dac363894267c5d4fc1dcd2c183aa3db.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Users\Admin\AppData\Local\Temp\dac363894267c5d4fc1dcd2c183aa3db.exe
      C:\Users\Admin\AppData\Local\Temp\dac363894267c5d4fc1dcd2c183aa3db.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\dac363894267c5d4fc1dcd2c183aa3db.exe

    Filesize

    92KB

    MD5

    b99e9194dfcb5eae9327283bcd778af2

    SHA1

    8867ed46b325db74e2708ae489e4a9d7fe3d6962

    SHA256

    ca68f5c4f47886931d780ce13c81415baa0071a332d462af97172fb12869caed

    SHA512

    11dc5fbcfb6ef2d71fad3e71d018bf4cd06367ace7d8cce3e16cf817db0b953ea1691dac44652caafaadae575aa6d63d05208ade5432317d462171536b586445

  • \Users\Admin\AppData\Local\Temp\dac363894267c5d4fc1dcd2c183aa3db.exe

    Filesize

    115KB

    MD5

    3f020b19d78ea6fec073c6abfe41bf09

    SHA1

    290edebca89e7f27b23a1b861d4ae56c079fbaaf

    SHA256

    f046606bb8f523f08090b4d4bef849d36d7fbe2c7cecb0c088ec8a70138d3497

    SHA512

    82e864162b93e0dba2f0decb58d5b76345ef41a6561b3b78ba2ab09bf5615d3765592d4cb08bce871c6c58de0f43fae6e2f7d988a47d9e275c57201d1eb9e80e

  • memory/1972-2-0x0000000001FA0000-0x00000000021FA000-memory.dmp

    Filesize

    2.4MB

  • memory/1972-1-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/1972-0-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/1972-16-0x0000000004C40000-0x00000000055DE000-memory.dmp

    Filesize

    9.6MB

  • memory/1972-15-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/1972-25-0x0000000004C40000-0x00000000055DE000-memory.dmp

    Filesize

    9.6MB

  • memory/2668-17-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2668-19-0x0000000001FA0000-0x00000000021FA000-memory.dmp

    Filesize

    2.4MB

  • memory/2668-26-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB