Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2023, 16:30

General

  • Target

    f13c7127b510663e664078269ebe77af.exe

  • Size

    133KB

  • MD5

    f13c7127b510663e664078269ebe77af

  • SHA1

    045e1f57590f4a67b6754956c13504e337e4c98c

  • SHA256

    b0a760e8e165a41e08f9dcc53c76969d10d9060cfa5490c59491f5520e4ffdb5

  • SHA512

    911f58a77e5c46afec9f4a8e4c0f16562a81588aa64665c606c247d8d19f6eb735193ea75d9b8fdedb99c6dfbb37304205772324333d9c5b87cec36d3af8e5fb

  • SSDEEP

    3072:3Wmye465cBDMZSRLkzsb0TK2FEwP/4cpPpzjoLGHoYCCQ:3Jye46S1+0MsaEq4Oo2zQ

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f13c7127b510663e664078269ebe77af.exe
    "C:\Users\Admin\AppData\Local\Temp\f13c7127b510663e664078269ebe77af.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1360
    • C:\Users\Admin\AppData\Local\Temp\f13c7127b510663e664078269ebe77af.exe
      C:\Users\Admin\AppData\Local\Temp\f13c7127b510663e664078269ebe77af.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\f13c7127b510663e664078269ebe77af.exe

    Filesize

    133KB

    MD5

    f919ffd36db279ac96aa5be308208b53

    SHA1

    5574506d56f384e73e6bda2df9a68e0f2589b5c0

    SHA256

    ca97a76f728f4f4962bf7043ec09687977a69af5fc7b1711f89d14cacc1868d0

    SHA512

    f2353324b11cde70c7ea12c43f3a81b7bb550ae219b0f1a4727c5cae73145f8c45d12f5276cefca6236d27bbeb3873eaf63867114c8bbd6c450fc1ff1e21819f

  • memory/1360-0-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/1360-2-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1360-1-0x00000000000E0000-0x0000000000101000-memory.dmp

    Filesize

    132KB

  • memory/1360-13-0x0000000000350000-0x00000000003D6000-memory.dmp

    Filesize

    536KB

  • memory/1360-15-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2356-17-0x0000000000150000-0x0000000000171000-memory.dmp

    Filesize

    132KB

  • memory/2356-29-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB