Analysis

  • max time kernel
    141s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2023, 15:58

General

  • Target

    e3b32531ff26ddb49cef955e565fef4a.exe

  • Size

    1.5MB

  • MD5

    e3b32531ff26ddb49cef955e565fef4a

  • SHA1

    6b1816e6ba00871b2ac0fc98b76654b7d4f63ed7

  • SHA256

    6a1b2eac3e4746f7635abfe12d19f237dfefedbe82b0b79c806a6e508d40bd22

  • SHA512

    6eb2af953831f3c1d810464e84ab902468380e6eefc42ff705a9ddc549c078a7ef3110343574ece5ba064fde9c693c7843de98802a2173454b0286dd2b2ee30b

  • SSDEEP

    24576:c+ejQ7fJt2BSfuTwQLyhWveB+4goGQoadai7D3uITjIFOxo53ApIj:c+ejQ7fJt2ByuTwQLyhWveB+4goGQ7aX

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e3b32531ff26ddb49cef955e565fef4a.exe
    "C:\Users\Admin\AppData\Local\Temp\e3b32531ff26ddb49cef955e565fef4a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1760
    • C:\Users\Admin\AppData\Local\Temp\e3b32531ff26ddb49cef955e565fef4a.exe
      C:\Users\Admin\AppData\Local\Temp\e3b32531ff26ddb49cef955e565fef4a.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2316
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\e3b32531ff26ddb49cef955e565fef4a.exe" /TN Nnb8kaFf43a4 /F
        3⤵
        • Creates scheduled task(s)
        PID:2680
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN Nnb8kaFf43a4 > C:\Users\Admin\AppData\Local\Temp\D9eQZu.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2896
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN Nnb8kaFf43a4
          4⤵
            PID:2584

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\D9eQZu.xml

      Filesize

      1KB

      MD5

      55e857bec315d378da564a3b98775368

      SHA1

      e581ace1c4fdbfdcf139af96f1551970afeeca44

      SHA256

      2637d2c7cf954bfcc8b4dec8a7f7d182d2fcdd8aafa3a84c8fbb871c6919048f

      SHA512

      eeb96c70e4630efae111e306c62a3c56f1e104df0a74db3b987d67a8d443b94e3ddbdf8d654dc790a2e61f4dd65349b0cd4a2b0a85655667e94e4cbbded77b4c

    • \Users\Admin\AppData\Local\Temp\e3b32531ff26ddb49cef955e565fef4a.exe

      Filesize

      1.5MB

      MD5

      ec2c2af382f06a7c35e048ab3fb7f690

      SHA1

      4a59dd777338d27ebace75599a83134895b57f2f

      SHA256

      a94b3390ef3b085c7366cd69ececbbb3f90d74a26e538295c2c0ded867fff54e

      SHA512

      29103dce4c6e02aaf00c4a4ab4663219644f8a889e4c9543e563a6401c4c1e1d5bcade04b03b13a10a5471248893347a9bbd8a7ef96142475b9b46812d54887b

    • memory/1760-1-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/1760-2-0x0000000001660000-0x00000000016DE000-memory.dmp

      Filesize

      504KB

    • memory/1760-16-0x0000000022FD0000-0x000000002322C000-memory.dmp

      Filesize

      2.4MB

    • memory/1760-15-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/1760-0-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/1760-54-0x0000000022FD0000-0x000000002322C000-memory.dmp

      Filesize

      2.4MB

    • memory/2316-20-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2316-31-0x0000000000200000-0x000000000026B000-memory.dmp

      Filesize

      428KB

    • memory/2316-26-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/2316-22-0x00000000002F0000-0x000000000036E000-memory.dmp

      Filesize

      504KB

    • memory/2316-55-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB