Analysis

  • max time kernel
    5s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2023, 15:01

General

  • Target

    d129e79afa5288fa3a38a3eb91d66ade.exe

  • Size

    3.9MB

  • MD5

    d129e79afa5288fa3a38a3eb91d66ade

  • SHA1

    ec3c53866036ff8c8db1386c57e1f90a4492ee2b

  • SHA256

    79a47b8279c3fb4e4c9bf524b078301037c8c509146bd88f6e29580f6bd38953

  • SHA512

    3c106297add94645b8b2fc1f4db12366143be59baefa39e1c6f384341f6eba042511694f66ebf41c2fc48dbc7cde95446bac7bffbf20ca0e75f7847691f51dd7

  • SSDEEP

    98304:usfND1rs3GgJyXUWGzVee/Vo6eNgJyXUWGCXGb/7mNJyXUWGzVee/Vo6eNgJyXUZ:NjEzZzse/Vo6zZCXg/CbzZzse/Vo6zZ

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d129e79afa5288fa3a38a3eb91d66ade.exe
    C:\Users\Admin\AppData\Local\Temp\d129e79afa5288fa3a38a3eb91d66ade.exe
    1⤵
    • Deletes itself
    • Executes dropped EXE
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Windows\SysWOW64\schtasks.exe
      schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\d129e79afa5288fa3a38a3eb91d66ade.exe" /TN QxutJGth3fd4 /F
      2⤵
      • Creates scheduled task(s)
      PID:2696
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c schtasks.exe /Query /XML /TN QxutJGth3fd4 > C:\Users\Admin\AppData\Local\Temp\PORE9xd.xml
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2828
  • C:\Users\Admin\AppData\Local\Temp\d129e79afa5288fa3a38a3eb91d66ade.exe
    "C:\Users\Admin\AppData\Local\Temp\d129e79afa5288fa3a38a3eb91d66ade.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3012
  • C:\Windows\SysWOW64\schtasks.exe
    schtasks.exe /Query /XML /TN QxutJGth3fd4
    1⤵
      PID:2604

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\PORE9xd.xml

      Filesize

      1KB

      MD5

      d1d454c0bf0122bc87e428568c57bde6

      SHA1

      bb18b53502fdeabd8874b0e180404f318fd83f99

      SHA256

      70cc6cb5a557020261d3705115b5bcfa86af0662ebe8b6be1c32880c025879dd

      SHA512

      837048cb630c6709cd56813b7495201b8bf907f77499dd3611c457ac47ed30831a32d5f82eba6815c07b0b63a629125839593b83a7d23a2594797dccbb9bb886

    • C:\Users\Admin\AppData\Local\Temp\d129e79afa5288fa3a38a3eb91d66ade.exe

      Filesize

      164KB

      MD5

      e0706f4a1f2967e724aad33395ea6a26

      SHA1

      bcb22c2d055fbcdcfe81efee95dd6c73dacd4ecf

      SHA256

      ef1a012fd8503b5bec22739c24518ec94a4e7bae902eafa1bd37b2ab7ec67804

      SHA512

      d4e53e49ef48689f86a7284c97dad9e72fde77b2118d2b04b8ae169a3f8639e0cdb8751054a59cd4ac331b7aa4fe54035491dffb72823f74899f6d40bdb1b06f

    • \Users\Admin\AppData\Local\Temp\d129e79afa5288fa3a38a3eb91d66ade.exe

      Filesize

      114KB

      MD5

      e3748d2258bbc2508e9b01adcfb141c8

      SHA1

      64803a58daa4dd09769eb237e61654ebe126dc41

      SHA256

      246b60ac74351b02cd08d96a840898e35c53a1efc1b3f686c7746dc0e52caca5

      SHA512

      acc23e76136bf9168203461ce995a899ccf09c2886bc4b294c86cc5c9ec62fd66cb8e833f51a5b6315d566720291fa34efa0c264cd61390a477fc2514d7f6614

    • memory/2256-19-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2256-31-0x0000000000280000-0x00000000002EB000-memory.dmp

      Filesize

      428KB

    • memory/2256-26-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/2256-21-0x0000000001660000-0x00000000016DE000-memory.dmp

      Filesize

      504KB

    • memory/2256-41-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/3012-0-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/3012-16-0x00000000237E0000-0x0000000023A3C000-memory.dmp

      Filesize

      2.4MB

    • memory/3012-3-0x0000000000280000-0x00000000002FE000-memory.dmp

      Filesize

      504KB

    • memory/3012-1-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/3012-18-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB