Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 17:17

General

  • Target

    07f56f3786b1ade31eabcfbd63e6c516.exe

  • Size

    501KB

  • MD5

    07f56f3786b1ade31eabcfbd63e6c516

  • SHA1

    38498da8934e6fa4d33fb6069aff0191859e161a

  • SHA256

    9fdf499501d7fa089e0b74e5571aabb9c1967746b47d1c77b7b004bbe9effe91

  • SHA512

    87359052df8f1ef8f2d717a20299ecd82d4eace41e0d78aa1f70c74ab958780b03582ae3284d5dd55f399f3e39cb213d512b8123608abe1cc8126a917a715eb7

  • SSDEEP

    12288:CmM26keYrNbL4c+3CAoY9xrMxwq1KYioUVbRskTmvme:CdvYrNbLRdY/Cw8KYioUtTA

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\07f56f3786b1ade31eabcfbd63e6c516.exe
    "C:\Users\Admin\AppData\Local\Temp\07f56f3786b1ade31eabcfbd63e6c516.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Users\Admin\AppData\Local\Temp\07f56f3786b1ade31eabcfbd63e6c516.exe
      C:\Users\Admin\AppData\Local\Temp\07f56f3786b1ade31eabcfbd63e6c516.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2676
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\07f56f3786b1ade31eabcfbd63e6c516.exe" /TN WAgLRKqP8c0d /F
        3⤵
        • Creates scheduled task(s)
        PID:2644
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN WAgLRKqP8c0d > C:\Users\Admin\AppData\Local\Temp\wlLteiUm.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2700
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN WAgLRKqP8c0d
          4⤵
            PID:1668

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\wlLteiUm.xml

      Filesize

      1KB

      MD5

      a9e68eb3b3ae983000d31b37dac59a0e

      SHA1

      818b1e0c1837ddaad6dbc388fd671442a3a732a4

      SHA256

      c5ed0087e1301f5f0c6f4eebb0dc6b3d252bee4d9b6f5b517740f685180fc5c2

      SHA512

      64cd2e026a3cdfc6b14803ebaa69403465afb8eaa58decafa4d1ba5d2435de854c4ac945f6c573c5b5d3e96a08115c6c6b4226af621c24a7ebbc30bd3b329fc1

    • \Users\Admin\AppData\Local\Temp\07f56f3786b1ade31eabcfbd63e6c516.exe

      Filesize

      501KB

      MD5

      1ba4fd7bede3ef098f6ce7e8a3344bbb

      SHA1

      af60a04f178bbabea65c5f02ef1ac6f0e347b26a

      SHA256

      e35fa90e4eb2fef697d5372b78d6e9477f451412d98c44d23803abd6ddc0863f

      SHA512

      c404a2d8061dd209a6c2fac337f949b71559429e05a3a58ea9c3bc64d10b2897ce562b1629a5052c7a4def54b731f4be1f142b24f3e0766043af16e89956db45

    • memory/2172-0-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2172-1-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/2172-2-0x0000000000290000-0x000000000030E000-memory.dmp

      Filesize

      504KB

    • memory/2172-16-0x0000000022FF0000-0x000000002324C000-memory.dmp

      Filesize

      2.4MB

    • memory/2172-15-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/2676-19-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2676-21-0x0000000000250000-0x00000000002CE000-memory.dmp

      Filesize

      504KB

    • memory/2676-27-0x0000000000340000-0x00000000003AB000-memory.dmp

      Filesize

      428KB

    • memory/2676-26-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/2676-32-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB