Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 07:04

General

  • Target

    5b5d3dd4d52bb6614327ae1933610c7a.exe

  • Size

    695KB

  • MD5

    5b5d3dd4d52bb6614327ae1933610c7a

  • SHA1

    8923de4c726d7badf550422ff88d2e1274e3852e

  • SHA256

    e155111b6990086e74c0802af0f230dca7be8d377d7b8d4cc16bc4ee1cb6b2e2

  • SHA512

    ae595f6408faab049a5ec20251e84d3d3c1f4b6ce6d8fb3aa30b7ea3ab3bf0439efc080956e341d70b2129a3ffda227ed7c081a722b06ba4924edca1fafb59cb

  • SSDEEP

    12288:LN4brFazy+iGK2UdsZ26m1WrL+xcxz64V2GF3ZGfXvox/AZiqTi2KORWDbkGr:LaFMy+iR2U0KGN64V2qVx/AU5rfkGr

Score
7/10
upx

Malware Config

Signatures

  • Loads dropped DLL 6 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b5d3dd4d52bb6614327ae1933610c7a.exe
    "C:\Users\Admin\AppData\Local\Temp\5b5d3dd4d52bb6614327ae1933610c7a.exe"
    1⤵
    • Loads dropped DLL
    PID:1684

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\nsi89A.tmp\LuaBridge.dll

          Filesize

          12KB

          MD5

          9781b7bb06ea11ebce5dc9d57b3437a3

          SHA1

          604123977fffadebfefccae08df6b8e2e5dbab82

          SHA256

          c26d867114a04c677ef9ac35d83c2d362c1fb9ff8d46abfb785d71a48cb9c309

          SHA512

          666125abfb144665506e1085793656f31708211b940efca8188a5b20d57a058dcae10ec274a7614450f7b66854c9239c2838e61b3721c10482710a2008b681d7

        • \Users\Admin\AppData\Local\Temp\nsi89A.tmp\LuaSocket\mime\core.dll

          Filesize

          52KB

          MD5

          4a4845ba1666907f708c9c10a31ec227

          SHA1

          1ebf626adc84147e5114885ce779f92d6eb68f3a

          SHA256

          a1ffee9687ab4a23a78b3251888aff09e2896d76f8d16d713367b265f125188d

          SHA512

          d009f5e2a2ecfbec5e5e788ade142d612846d0c99921774e4a11b060998dfb0680cf1e1a54604535d5560738093f9ae166866cb23eee5c7d9c4e5cc5a33e7464

        • \Users\Admin\AppData\Local\Temp\nsi89A.tmp\LuaSocket\socket\core.dll

          Filesize

          80KB

          MD5

          4bf7db111acfa7c28ad36606107b3322

          SHA1

          6f20b9f6663ce0c309a2ce60e718d64ffb6c75b3

          SHA256

          bfe8445c38ee71240e856f85d79e94123d7179bf43688de0e2a14e32e6ef21b0

          SHA512

          0a5e66a65b80e15d8198f2934c58227ae17680f0fbea9865b2f44af82a29c53d4f95cf9616b4dfd75202420eb73b7d962cf2c84fdad6ce26afe1eb4bb978d0b6

        • \Users\Admin\AppData\Local\Temp\nsi89A.tmp\LuaXml_lib.dll

          Filesize

          11KB

          MD5

          7292b642bd958aeb7fd7cfd19e45b068

          SHA1

          19a800620d041634abae5b5d096cb0e87ce4c188

          SHA256

          90f1bb98e034fcf7bfddb8cb0a85b27a9c9ddb01b926b4e139e1e8fc53d41d09

          SHA512

          bd758e0833454e0aa2af976ac94fde17c5401102c5991887cefbe8e337974381584c73e2d1e50e49263c55c3788e24dc7f8bd0b9d2a76a6cbe38e48dd9d6c44a

        • \Users\Admin\AppData\Local\Temp\nsi89A.tmp\lua51.dll

          Filesize

          92KB

          MD5

          3b203b1d644637b7066fcabf20141624

          SHA1

          5153d61added3bfe80f38789dc2170a02a865150

          SHA256

          63eac77bc3189a1769e7e1d336683c02ded56f675ca02abcc2898868f04a6637

          SHA512

          7eb695b4bcf7085ace53528d05773f084876a977ad2dc1a958f1ef502c6de0b360dc8ea7528006a29b9847cff914357e77151f67d02ec05f3ef2666efacab743

        • memory/1684-0-0x0000000000400000-0x00000000004AB000-memory.dmp

          Filesize

          684KB

        • memory/1684-62-0x0000000002020000-0x000000000206E000-memory.dmp

          Filesize

          312KB

        • memory/1684-52-0x0000000002010000-0x000000000201E000-memory.dmp

          Filesize

          56KB

        • memory/1684-40-0x0000000001FF0000-0x0000000002006000-memory.dmp

          Filesize

          88KB

        • memory/1684-206-0x0000000000400000-0x00000000004AB000-memory.dmp

          Filesize

          684KB

        • memory/1684-207-0x0000000000610000-0x0000000000619000-memory.dmp

          Filesize

          36KB