Analysis

  • max time kernel
    137s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 18:08

General

  • Target

    3356eca22e47d39344f4c05538dc880e.exe

  • Size

    302KB

  • MD5

    3356eca22e47d39344f4c05538dc880e

  • SHA1

    b2eadf75c404f5d3ee82605193df5e634550c56e

  • SHA256

    aa93163bf303a0d9e4412fcdfcc1e7b7976cfa7a227a73628d33e103b2887d33

  • SHA512

    95a9f3de502f48b1653f85d87650f9db8a12bc77f960fbf9597ec0b6969dc4029d1cf0a32756f89452a3e4f4fe5018ad6267eb901251ddf9e8cb95e454646620

  • SSDEEP

    6144:qrWHeeOIuf6QddbVXCqT+9Q1N3GXsl6G/TaBfM1mQ:qrWrOIZqtvWQ1Jx6G/mfIm

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3356eca22e47d39344f4c05538dc880e.exe
    "C:\Users\Admin\AppData\Local\Temp\3356eca22e47d39344f4c05538dc880e.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2924
    • C:\Users\Admin\AppData\Local\Temp\3356eca22e47d39344f4c05538dc880e.exe
      C:\Users\Admin\AppData\Local\Temp\3356eca22e47d39344f4c05538dc880e.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3356eca22e47d39344f4c05538dc880e.exe

    Filesize

    92KB

    MD5

    5d2e76124432524f65ac3025cfd6a6a1

    SHA1

    87807921424d0d9e4a0a4475695551796f630075

    SHA256

    b6912fcc7826ab305d1f8860110d06a5b4e85c88c79fd0d8898b08f021e17219

    SHA512

    653ad1395d9ac9cee0441329a84c5202ef8eb75e5653c406c7ba9df4d403a4fd2d9cfce4b023820e030783e9638175c5cf0174899862b95c9d584b61e1902aaf

  • \Users\Admin\AppData\Local\Temp\3356eca22e47d39344f4c05538dc880e.exe

    Filesize

    302KB

    MD5

    93515ccb7790bd764232a3a37a998af1

    SHA1

    b86a7ce353cdb491c42c0ba79da02e7c49ccea7c

    SHA256

    9e399874fbe3d9432a04f900f7409462b794acd7449aff6b2bdf25343618638e

    SHA512

    01ceb7d5bf04659fe7d8d73cc84c10adfa722b424ebe1b2af767265383ea3364161c3ccebe3d127281a666f312afd9ce1c340dd9b266cef15e6b5b204923ff9b

  • memory/2160-18-0x00000000001F0000-0x0000000000221000-memory.dmp

    Filesize

    196KB

  • memory/2160-21-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/2160-34-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/2924-0-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/2924-1-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2924-15-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2924-10-0x0000000000200000-0x0000000000231000-memory.dmp

    Filesize

    196KB

  • memory/2924-33-0x0000000000200000-0x0000000000231000-memory.dmp

    Filesize

    196KB