Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/12/2023, 14:57

General

  • Target

    d08c88f2cb6c595652ceacc75b9e1bc8.exe

  • Size

    5.3MB

  • MD5

    d08c88f2cb6c595652ceacc75b9e1bc8

  • SHA1

    6d51208a254b2885a68c2e656fca9144dab1467f

  • SHA256

    e6c8a5abc5c755c9d4c167cb93b231088ec4870b13faa441a7dd56a4f18c96e1

  • SHA512

    55ea2e69931e98aa7d10f11890988161c78e6bf470a446ae4a9e456894e01431941d99deb972e7175e5f3ee32a7c935465cbcbdbf5d067a2d96197291bb04b39

  • SSDEEP

    98304:oV8vvbObF3I3Yk4hmWTNCfYRTCdMF2UBAw4hF/nty8CCfYRTCdMF2U:08vDK3Ij4hmvfYJCdQNAHhF/EzCfYJCi

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d08c88f2cb6c595652ceacc75b9e1bc8.exe
    "C:\Users\Admin\AppData\Local\Temp\d08c88f2cb6c595652ceacc75b9e1bc8.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2568
    • C:\Users\Admin\AppData\Local\Temp\d08c88f2cb6c595652ceacc75b9e1bc8.exe
      C:\Users\Admin\AppData\Local\Temp\d08c88f2cb6c595652ceacc75b9e1bc8.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2988

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\d08c88f2cb6c595652ceacc75b9e1bc8.exe

    Filesize

    369KB

    MD5

    848a0f862501074aecc655b4d81b2f48

    SHA1

    f01aaa10f857373916eab58729b0e4a011147b9a

    SHA256

    69d97e98d089a9e518d165fa641302fad3dc191098a5b4c2dab63c05ee26262c

    SHA512

    e5a86e47a45e53892f322266a8ab8652b4711370e91fe56ef34f126727710507cf67428469106491494e75c565203495eb4658cf56eff7dfe0b1acfec503e6fc

  • memory/2568-0-0x0000000000400000-0x000000000086A000-memory.dmp

    Filesize

    4.4MB

  • memory/2568-1-0x0000000001BD0000-0x0000000001CE2000-memory.dmp

    Filesize

    1.1MB

  • memory/2568-2-0x0000000000400000-0x00000000005F2000-memory.dmp

    Filesize

    1.9MB

  • memory/2568-13-0x0000000000400000-0x00000000005F2000-memory.dmp

    Filesize

    1.9MB

  • memory/2988-15-0x0000000000400000-0x00000000005F2000-memory.dmp

    Filesize

    1.9MB

  • memory/2988-17-0x0000000001870000-0x0000000001982000-memory.dmp

    Filesize

    1.1MB

  • memory/2988-14-0x0000000000400000-0x000000000086A000-memory.dmp

    Filesize

    4.4MB

  • memory/2988-23-0x0000000000400000-0x000000000086A000-memory.dmp

    Filesize

    4.4MB