Analysis

  • max time kernel
    119s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2023, 15:09

General

  • Target

    d2e817db9beeea56e8ba3be197a00ae8.exe

  • Size

    1003KB

  • MD5

    d2e817db9beeea56e8ba3be197a00ae8

  • SHA1

    611541467d847f9617ac309c86205cc40a177aab

  • SHA256

    d475599c7866a04e4df20304129bc06721e12af17977630e5d4926db7ce91153

  • SHA512

    f74f3562b769da19af80fbc3022a160d07ce39915ee8964e2b33b543a10aab01de72bdd79d7fba70ed5c039021a2c6a86e47444a7612f14c79b0c0c9de5fbf5a

  • SSDEEP

    12288:FYMxsQfYXXfpVVbKC8hnF97D3K4S1R44XdGgGbqAMN07ppo8cO8vJB/R1zVaZ6/M:FCpDKHfQCESqBC7VABE6Ht5kOX6Z

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d2e817db9beeea56e8ba3be197a00ae8.exe
    "C:\Users\Admin\AppData\Local\Temp\d2e817db9beeea56e8ba3be197a00ae8.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Users\Admin\AppData\Local\Temp\d2e817db9beeea56e8ba3be197a00ae8.exe
      C:\Users\Admin\AppData\Local\Temp\d2e817db9beeea56e8ba3be197a00ae8.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2680
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\d2e817db9beeea56e8ba3be197a00ae8.exe" /TN BSpsfata099d /F
        3⤵
        • Creates scheduled task(s)
        PID:2808
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN BSpsfata099d > C:\Users\Admin\AppData\Local\Temp\QlLU2yp.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2144
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN BSpsfata099d
          4⤵
            PID:2816

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\CabACC5.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\QlLU2yp.xml

      Filesize

      1KB

      MD5

      8d7eb192e9d07ba0e5171b362cbb1c90

      SHA1

      861d865529b0386098b5e665d8aa6fcc6c0c9a62

      SHA256

      598ccbab38337320f9e804e1d019bd3f707701e30098a07c12d6579d03d7bac9

      SHA512

      8ec5164a3f9156c2aa514ef3193afc26afef4c26910c6871b63c662e546ee3f4f0b9844db3977c49ed26d5c5f36a8df0123089a3ceaa356976116e38e7951d4c

    • C:\Users\Admin\AppData\Local\Temp\d2e817db9beeea56e8ba3be197a00ae8.exe

      Filesize

      1003KB

      MD5

      b17e1af6344f6a0f1de36383b38253a8

      SHA1

      4a7465eeef1b16cb6ff6e9675511d9b601b2b182

      SHA256

      0af2641c7012357aaff765b6f10a17b5907460c3fabefa345cdb1250e12449f2

      SHA512

      f508ca35be72d0ecabe32280127e258967905347d31b06ccaedcc74a6827e705cba50d2d5cd054739c4e84c8a0fee6b0bbb819d218aab70c8aba15e675bf11c8

    • memory/2168-15-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/2168-16-0x0000000022F20000-0x000000002317C000-memory.dmp

      Filesize

      2.4MB

    • memory/2168-0-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2168-2-0x0000000022D90000-0x0000000022E0E000-memory.dmp

      Filesize

      504KB

    • memory/2168-1-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/2680-18-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2680-21-0x0000000000280000-0x00000000002FE000-memory.dmp

      Filesize

      504KB

    • memory/2680-27-0x0000000000300000-0x000000000036B000-memory.dmp

      Filesize

      428KB

    • memory/2680-26-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/2680-43-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB