Analysis

  • max time kernel
    166s
  • max time network
    436s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/12/2023, 15:33

General

  • Target

    da4cb21ccabf55ba5c1d2c1ec3594b2f.exe

  • Size

    7.8MB

  • MD5

    da4cb21ccabf55ba5c1d2c1ec3594b2f

  • SHA1

    2ee2727853ea8f4d58d4a11553e3f49eca322bb8

  • SHA256

    f816645ab66a39352b4bd0ca4d3b51d87ecc030826c48fd8f441f7b71d42ef9f

  • SHA512

    9981aa24e5f0117e8cb2fbf8a6da0334038b7efe2ab75eb5eff8fe251f759a2300a5b492d598694619b2e9168242d1a0a1d3d1867687264c0859b8693c756e33

  • SSDEEP

    196608:ISkgVHnMzLqlLmW+DzLqbHZz4zLqlLmW+DzLqGshzLqlLmW+DzLqbHZz4zLqlLm0:fszhzsHZ8zhzQhzhzsHZ8zhz

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Program crash 4 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da4cb21ccabf55ba5c1d2c1ec3594b2f.exe
    "C:\Users\Admin\AppData\Local\Temp\da4cb21ccabf55ba5c1d2c1ec3594b2f.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1120
    • C:\Users\Admin\AppData\Local\Temp\da4cb21ccabf55ba5c1d2c1ec3594b2f.exe
      C:\Users\Admin\AppData\Local\Temp\da4cb21ccabf55ba5c1d2c1ec3594b2f.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:4776
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\da4cb21ccabf55ba5c1d2c1ec3594b2f.exe" /TN apJZ6MnXc37d /F
        3⤵
        • Creates scheduled task(s)
        PID:2696
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN apJZ6MnXc37d > C:\Users\Admin\AppData\Local\Temp\Af2yZv2A.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4968
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN apJZ6MnXc37d
          4⤵
            PID:2640
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4776 -s 616
          3⤵
          • Program crash
          PID:4720
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4776 -s 608
          3⤵
          • Program crash
          PID:4444
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4776 -s 632
          3⤵
          • Program crash
          PID:2600
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4776 -s 656
          3⤵
          • Program crash
          PID:2360
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4776 -ip 4776
      1⤵
        PID:1288
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4776 -ip 4776
        1⤵
          PID:1184
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4776 -ip 4776
          1⤵
            PID:4800
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4776 -ip 4776
            1⤵
              PID:1672

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\Af2yZv2A.xml

              Filesize

              1KB

              MD5

              273a49c47543ec23d03760c63fd06d37

              SHA1

              97e91426bde1ceeda35a4276c65d79e6f35d9109

              SHA256

              dd84035dbea4f3f93952d9364e145c7df9fa491cfd9ac97e93976a69757f77f0

              SHA512

              a91c686ee76e1f8403886563b1ddb1e13eb9c6071b41eebe321de46938b489a2255114151eef1eb7aebf7cea16aedbaec09a54f18991374bb638c9f3dbf2093a

            • C:\Users\Admin\AppData\Local\Temp\da4cb21ccabf55ba5c1d2c1ec3594b2f.exe

              Filesize

              1.4MB

              MD5

              82ad6b564b804e293b63fed7cbb0c4c5

              SHA1

              fc06f63e7c69579e211b233865bd281f0cc44eba

              SHA256

              a013a5dc01d062cb01591bd5f4a769686dee874dda2ea54304b8c5d1ecf5afba

              SHA512

              91776cdf8485182985c2302d0654cc40a7ff19c80681fd47dd7704045e14d684069bca95e7ad03ce672f51c236a5cd6c7cbadd768550ab9b9c6eda5def182cc1

            • memory/1120-0-0x0000000000400000-0x000000000065C000-memory.dmp

              Filesize

              2.4MB

            • memory/1120-1-0x0000000000400000-0x000000000046B000-memory.dmp

              Filesize

              428KB

            • memory/1120-4-0x0000000025030000-0x00000000250AE000-memory.dmp

              Filesize

              504KB

            • memory/1120-13-0x0000000000400000-0x000000000046B000-memory.dmp

              Filesize

              428KB

            • memory/4776-14-0x0000000000400000-0x000000000065C000-memory.dmp

              Filesize

              2.4MB

            • memory/4776-16-0x0000000001720000-0x000000000179E000-memory.dmp

              Filesize

              504KB

            • memory/4776-22-0x0000000000470000-0x00000000004DB000-memory.dmp

              Filesize

              428KB

            • memory/4776-23-0x0000000000400000-0x000000000045B000-memory.dmp

              Filesize

              364KB

            • memory/4776-32-0x0000000000400000-0x000000000065C000-memory.dmp

              Filesize

              2.4MB