Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    28/12/2023, 23:28

General

  • Target

    ffe081e15729b15dc0f2818ce465bf52.exe

  • Size

    309KB

  • MD5

    ffe081e15729b15dc0f2818ce465bf52

  • SHA1

    d9a1623b48d7e58718c6e6fc36c5dd92b1cd516a

  • SHA256

    e97a98d52a9440d80b50c4cc304581c9bce54aecbc721342cb59c0a74e54e983

  • SHA512

    2dd6dd547439fd8bece0b06d866211bb8c1046e96617ed785d256c967a253197129a504849ba94db25915731dea74556d5a5c56b0d43b927ccd13bedfffbc8d2

  • SSDEEP

    6144:wdcah36Ld7aeSZ+sRKriIA04iqBXgVrHTuRDgRC1H4hpzzpxc4x3soSXlCW:Q7hOBad+sRIiYd4ErzEDg4Yh9JcoSXAW

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ffe081e15729b15dc0f2818ce465bf52.exe
    "C:\Users\Admin\AppData\Local\Temp\ffe081e15729b15dc0f2818ce465bf52.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    PID:844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGM5U0T3\http_404_webOC[1]

    Filesize

    6KB

    MD5

    92ab50175c4b03970f264c637c78febe

    SHA1

    b00fbe1169da972ba4a4a84871af9eca7479000a

    SHA256

    3926c545ae82fc264c98d6c229a8a0999e2b59ed2bb736f1bda9e2f89e0eeac8

    SHA512

    3311f118963ad1eaf1b9c7fb10b67280aae1ab38358aed77c10f2587100427af58c7d008abb46ad0f59880ac51e50b5a53fc2c2a96d70f5ece4578ab72382b7a

  • C:\Users\Admin\AppData\Local\Temp\Cab66C1.tmp

    Filesize

    21KB

    MD5

    432970700b8e291e1e3d1932e0ee7fdc

    SHA1

    373e54d51e05b4826ead3c0403016facca8c7a46

    SHA256

    6d4aaf760811de02438bfa2e67f8780a42a6e9ec6cd0515d18ebf69a76dd0319

    SHA512

    1211327d26b82dccb35c9bc1c23910ad655812ee7c8cf4747e603d806a8fec4ba0ff61201b8784aed910165f43dad87fb2f7cf2f57a7a5b9633fbcafffef662e

  • memory/844-0-0x0000000000400000-0x00000000004E1000-memory.dmp

    Filesize

    900KB

  • memory/844-17-0x0000000000400000-0x00000000004E1000-memory.dmp

    Filesize

    900KB

  • memory/844-60-0x0000000000400000-0x00000000004E1000-memory.dmp

    Filesize

    900KB

  • memory/844-62-0x0000000000400000-0x00000000004E1000-memory.dmp

    Filesize

    900KB