Analysis

  • max time kernel
    141s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 13:19

General

  • Target

    71c1a65b2624d6b5f75132089710b592.exe

  • Size

    663KB

  • MD5

    71c1a65b2624d6b5f75132089710b592

  • SHA1

    428f3341caf1b66a42695a6fa9c980fa37f43f0d

  • SHA256

    419b64a7831795df0a40619b5f190f54ff5d300c6702588b3a7c24a18f3a53c8

  • SHA512

    a015eb2c943ec1cdf0dc785a58bef0ccaf510d4c87812a131cfc7b40adad6761bc1d633443b48c5387a954586f618779742438198c8a39e63550aa16394e09ea

  • SSDEEP

    12288:BnvpebEFCgHco3xqixdQuH7puHK4djfc1d8/ANRuDpwLBHaNqmdrp1p3JRw7IzHb:BnvkEFCg8ojHlJufid840pbqEN3kOH

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 31 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\71c1a65b2624d6b5f75132089710b592.exe
    "C:\Users\Admin\AppData\Local\Temp\71c1a65b2624d6b5f75132089710b592.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2024

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2024-3-0x0000000001C70000-0x0000000001D16000-memory.dmp

          Filesize

          664KB

        • memory/2024-7-0x0000000001D20000-0x0000000001E64000-memory.dmp

          Filesize

          1.3MB

        • memory/2024-9-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/2024-8-0x0000000001D20000-0x0000000001E64000-memory.dmp

          Filesize

          1.3MB

        • memory/2024-6-0x0000000001D20000-0x0000000001E64000-memory.dmp

          Filesize

          1.3MB

        • memory/2024-5-0x0000000001D20000-0x0000000001E64000-memory.dmp

          Filesize

          1.3MB

        • memory/2024-1-0x0000000001D20000-0x0000000001E64000-memory.dmp

          Filesize

          1.3MB

        • memory/2024-0-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2024-107-0x0000000001D20000-0x0000000001E64000-memory.dmp

          Filesize

          1.3MB

        • memory/2024-110-0x0000000001D20000-0x0000000001E64000-memory.dmp

          Filesize

          1.3MB

        • memory/2024-108-0x0000000001D20000-0x0000000001E64000-memory.dmp

          Filesize

          1.3MB

        • memory/2024-106-0x0000000001D20000-0x0000000001E64000-memory.dmp

          Filesize

          1.3MB

        • memory/2024-175-0x0000000001D20000-0x0000000001E64000-memory.dmp

          Filesize

          1.3MB

        • memory/2024-178-0x0000000001D20000-0x0000000001E64000-memory.dmp

          Filesize

          1.3MB

        • memory/2024-177-0x0000000001D20000-0x0000000001E64000-memory.dmp

          Filesize

          1.3MB

        • memory/2024-179-0x0000000001D20000-0x0000000001E64000-memory.dmp

          Filesize

          1.3MB

        • memory/2024-176-0x0000000001D20000-0x0000000001E64000-memory.dmp

          Filesize

          1.3MB

        • memory/2024-159-0x0000000001D20000-0x0000000001E64000-memory.dmp

          Filesize

          1.3MB

        • memory/2024-153-0x0000000001D20000-0x0000000001E64000-memory.dmp

          Filesize

          1.3MB

        • memory/2024-182-0x0000000001D20000-0x0000000001E64000-memory.dmp

          Filesize

          1.3MB

        • memory/2024-244-0x0000000001D20000-0x0000000001E64000-memory.dmp

          Filesize

          1.3MB

        • memory/2024-246-0x0000000001D20000-0x0000000001E64000-memory.dmp

          Filesize

          1.3MB

        • memory/2024-267-0x0000000001D20000-0x0000000001E64000-memory.dmp

          Filesize

          1.3MB

        • memory/2024-293-0x0000000001D20000-0x0000000001E64000-memory.dmp

          Filesize

          1.3MB

        • memory/2024-295-0x0000000001D20000-0x0000000001E64000-memory.dmp

          Filesize

          1.3MB

        • memory/2024-296-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/2024-301-0x0000000001D20000-0x0000000001E64000-memory.dmp

          Filesize

          1.3MB

        • memory/2024-302-0x0000000001D20000-0x0000000001E64000-memory.dmp

          Filesize

          1.3MB

        • memory/2024-306-0x0000000001D20000-0x0000000001E64000-memory.dmp

          Filesize

          1.3MB

        • memory/2024-308-0x0000000001D20000-0x0000000001E64000-memory.dmp

          Filesize

          1.3MB

        • memory/2024-311-0x0000000001D20000-0x0000000001E64000-memory.dmp

          Filesize

          1.3MB

        • memory/2024-312-0x0000000001D20000-0x0000000001E64000-memory.dmp

          Filesize

          1.3MB

        • memory/2024-315-0x0000000001D20000-0x0000000001E64000-memory.dmp

          Filesize

          1.3MB

        • memory/2024-316-0x0000000001D20000-0x0000000001E64000-memory.dmp

          Filesize

          1.3MB

        • memory/2024-319-0x0000000001D20000-0x0000000001E64000-memory.dmp

          Filesize

          1.3MB