Analysis

  • max time kernel
    146s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/12/2023, 16:27

General

  • Target

    ef997c5541b87fb4bc70bb5c54ded58f.exe

  • Size

    5.1MB

  • MD5

    ef997c5541b87fb4bc70bb5c54ded58f

  • SHA1

    152636b7a0f5424361d487b5f2a7e0220c8c1b09

  • SHA256

    be4bb06147a26609a4ebad9d14f4bad237d3544c8968ca0994dae79ee87a6c44

  • SHA512

    65ceb184195da876cc2143109fd619264caaab052f0137a1408827f92bc57a2cfb52d0f41bc3648dd4bff13cd11c9d65635792073c53441dff495d42c99c1ceb

  • SSDEEP

    49152:HJbsVUn+zcgx0c8Qk2ojD8pNiwwzy9iydt9EOeay3s5cqvCDknpuBmsAnOU1MWET:HVs6nUDXm3zyba3VDQDsiKIfOMy3

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef997c5541b87fb4bc70bb5c54ded58f.exe
    "C:\Users\Admin\AppData\Local\Temp\ef997c5541b87fb4bc70bb5c54ded58f.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1772
    • C:\Users\Admin\AppData\Local\Temp\ef997c5541b87fb4bc70bb5c54ded58f.exe
      C:\Users\Admin\AppData\Local\Temp\ef997c5541b87fb4bc70bb5c54ded58f.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:1192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ef997c5541b87fb4bc70bb5c54ded58f.exe

    Filesize

    248KB

    MD5

    d92aafb518e09046e3792a31a0352013

    SHA1

    77396624e1d80d6704e09031a728136ee4c9ff3f

    SHA256

    8f61131f0eeaec0ae86d9e6f665ac2d6f774a9123ac215013a1ab20e7706e033

    SHA512

    4e2d60cfb4f031deb34901bb156770106cd6e6cddb6c83d7ae4db83a63afbbe504d3508a55b16095d4d0a2ecc10d34827b535af17cc8ac86dfd31092e228cc7e

  • memory/1192-15-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/1192-17-0x0000000002190000-0x00000000023EA000-memory.dmp

    Filesize

    2.4MB

  • memory/1192-30-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/1772-1-0x0000000002180000-0x00000000023DA000-memory.dmp

    Filesize

    2.4MB

  • memory/1772-0-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/1772-2-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/1772-13-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB