Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2023, 16:32

General

  • Target

    f264fde0a75e4c5be4d744721aab0bae.exe

  • Size

    3.9MB

  • MD5

    f264fde0a75e4c5be4d744721aab0bae

  • SHA1

    582bcb356dce310b577166f82bf4f001a451516e

  • SHA256

    ab20ab68ab67761d605ae3f8740d762cdb9e7232bd619b2dbb4849015f7c8ac1

  • SHA512

    76448630359b93fbbe57ddc7cb71440787fa7a2e6cb10c4715916b96516419c3f7cdd0f2d431f91d50f76c2c2e1d253ecf1f63e13590a5661869acaefce2b56a

  • SSDEEP

    98304:UEgr0WsNA9zyULG+AsMoxvYNZeuA9zyULG+Awgsb4OkQA9zyULG+AsMoxvYNZeuQ:fggczLqe90IzLqWg5VdzLqe90IzLq

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f264fde0a75e4c5be4d744721aab0bae.exe
    "C:\Users\Admin\AppData\Local\Temp\f264fde0a75e4c5be4d744721aab0bae.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1852
    • C:\Users\Admin\AppData\Local\Temp\f264fde0a75e4c5be4d744721aab0bae.exe
      C:\Users\Admin\AppData\Local\Temp\f264fde0a75e4c5be4d744721aab0bae.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2960
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN U5Z8sQiHf24d > C:\Users\Admin\AppData\Local\Temp\PxQcA.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2672
  • C:\Windows\SysWOW64\schtasks.exe
    schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\f264fde0a75e4c5be4d744721aab0bae.exe" /TN U5Z8sQiHf24d /F
    1⤵
    • Creates scheduled task(s)
    PID:2900
  • C:\Windows\SysWOW64\schtasks.exe
    schtasks.exe /Query /XML /TN U5Z8sQiHf24d
    1⤵
      PID:2088

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\PxQcA.xml

      Filesize

      1KB

      MD5

      19ffd48378340e34c10a34c36700abcd

      SHA1

      4ac5b59283aa9b2bd818f93bb8d748f2ddfaf5ac

      SHA256

      e1ce1d8616887971f05bb316aaee3a728533509fd851b19a80853d9fe7924622

      SHA512

      1e0a0a7c487d765f3ba9f837cd65930c64d56a856e0b7108154ab8fa94def72664441180986875cc315dc44ed66af5fc7bd3b9f84126dbc733a4c5feb4a96616

    • C:\Users\Admin\AppData\Local\Temp\f264fde0a75e4c5be4d744721aab0bae.exe

      Filesize

      54KB

      MD5

      94f1f5753e3bed9195436e50a4ae9087

      SHA1

      365dc9a3f7bc5d66f654150e82d727ac77879f3f

      SHA256

      00ec5ee4ababb597f0dcce8009d7825b5ccd0c21a6582803d536dabf1a07d715

      SHA512

      d72657f4b8da80420d2583245e7268148720c1431fb967846d03491dabd5143eb4f9394a0a61facdd5cacab11abdda7aa0a8f52d45a664d05def4351b450e572

    • C:\Users\Admin\AppData\Local\Temp\f264fde0a75e4c5be4d744721aab0bae.exe

      Filesize

      98KB

      MD5

      40b3958deb3ad19a77522519aba77091

      SHA1

      2ff6ed16adcc3906176eaa01254c98b991754e55

      SHA256

      0a68610afc29b491189ca9fe6bf135b195eb3e4db5a2feda1f5ea9bc3111046f

      SHA512

      08b917fec76c5baebfa6fcf1b3a66cce148cc0661f2a41a64afb5156d802a94fc146001a94628ca364078d1415ae3e76622b064fa94fa408b0e1bac4811ee3bd

    • \Users\Admin\AppData\Local\Temp\f264fde0a75e4c5be4d744721aab0bae.exe

      Filesize

      722KB

      MD5

      928d75795eebee9cc8609a84fcee9b90

      SHA1

      b7f47f857fbfe58e35c9e49844744731e37f61c0

      SHA256

      ef5893a27f5b938cca22de667422253b327d6126054f803e731c2c029f8a02af

      SHA512

      8dcc87b60dfac938423c678b3693f62ac0c589e86728f64256e862de067a70dada1a021498240f86e83aa440dc0f01adbd69df9095a4921e5a3e9f9f2cf3f92b

    • memory/1852-16-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/1852-0-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/1852-7-0x00000000001A0000-0x000000000021E000-memory.dmp

      Filesize

      504KB

    • memory/1852-1-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/2960-20-0x0000000001660000-0x00000000016DE000-memory.dmp

      Filesize

      504KB

    • memory/2960-17-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2960-30-0x0000000000390000-0x00000000003FB000-memory.dmp

      Filesize

      428KB

    • memory/2960-25-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/2960-35-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB