Analysis

  • max time kernel
    161s
  • max time network
    178s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/12/2023, 18:28

General

  • Target

    0079b98cb0686e3e845103bc4d19d920.exe

  • Size

    7.8MB

  • MD5

    0079b98cb0686e3e845103bc4d19d920

  • SHA1

    960e7436ed41f1f55037cef8f3a86e76cd7ed310

  • SHA256

    d060c605108db374bd7034096e679c082d61209a9593c5cb4824b0a4cec4277a

  • SHA512

    40fc2b00f8ad1ecb82b3f0bf5f43c58ed41b15498fc0512a5ae8a99f318d483ed4bdb44e906d69ea6c40380b298427884d746bf57016cb77e9dbd6f9e096103e

  • SSDEEP

    196608:/kb8vDdliruWvrcmq56lN9dlirtUV7WEdliruWvrcmq56lN9dliryZMyUM9g1dlE:/kb8BWvtSktRWvtSkN3UHzWvtSktRWvN

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Program crash 17 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0079b98cb0686e3e845103bc4d19d920.exe
    "C:\Users\Admin\AppData\Local\Temp\0079b98cb0686e3e845103bc4d19d920.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4072
    • C:\Users\Admin\AppData\Local\Temp\0079b98cb0686e3e845103bc4d19d920.exe
      C:\Users\Admin\AppData\Local\Temp\0079b98cb0686e3e845103bc4d19d920.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2236
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\0079b98cb0686e3e845103bc4d19d920.exe" /TN aMYATtOZda0c /F
        3⤵
        • Creates scheduled task(s)
        PID:2788
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN aMYATtOZda0c > C:\Users\Admin\AppData\Local\Temp\AwUoiW1w5.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1092
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN aMYATtOZda0c
          4⤵
            PID:904
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 616
          3⤵
          • Program crash
          PID:1708
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 628
          3⤵
          • Program crash
          PID:4040
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 636
          3⤵
          • Program crash
          PID:2104
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 740
          3⤵
          • Program crash
          PID:3908
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 676
          3⤵
          • Program crash
          PID:2284
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 780
          3⤵
          • Program crash
          PID:1332
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 1464
          3⤵
          • Program crash
          PID:2300
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 1472
          3⤵
          • Program crash
          PID:2896
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 1916
          3⤵
          • Program crash
          PID:968
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 2104
          3⤵
          • Program crash
          PID:3488
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 1956
          3⤵
          • Program crash
          PID:3824
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 1920
          3⤵
          • Program crash
          PID:3976
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 1912
          3⤵
          • Program crash
          PID:4040
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 2188
          3⤵
          • Program crash
          PID:3228
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 2184
          3⤵
          • Program crash
          PID:4584
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 2208
          3⤵
          • Program crash
          PID:1072
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 2108
          3⤵
          • Program crash
          PID:2576
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2236 -ip 2236
      1⤵
        PID:4196
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2236 -ip 2236
        1⤵
          PID:3276
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2236 -ip 2236
          1⤵
            PID:1720
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2236 -ip 2236
            1⤵
              PID:1756
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 2236 -ip 2236
              1⤵
                PID:384
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2236 -ip 2236
                1⤵
                  PID:3240
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2236 -ip 2236
                  1⤵
                    PID:3480
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2236 -ip 2236
                    1⤵
                      PID:1192
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2236 -ip 2236
                      1⤵
                        PID:4288
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2236 -ip 2236
                        1⤵
                          PID:3760
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2236 -ip 2236
                          1⤵
                            PID:4368
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2236 -ip 2236
                            1⤵
                              PID:3492
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2236 -ip 2236
                              1⤵
                                PID:972
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2236 -ip 2236
                                1⤵
                                  PID:2720
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2236 -ip 2236
                                  1⤵
                                    PID:384
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 2236 -ip 2236
                                    1⤵
                                      PID:4552
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2236 -ip 2236
                                      1⤵
                                        PID:4256

                                      Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\Local\Temp\0079b98cb0686e3e845103bc4d19d920.exe

                                              Filesize

                                              4.4MB

                                              MD5

                                              e169bf26c52f43a500c9a18296ae14ba

                                              SHA1

                                              95041a93a50f1c8f823f01e6ddd68a7b22033c97

                                              SHA256

                                              a3f40ee9de8b7fb06664e709bf742f8f86230c2fa3ea68d3cfd1bc4162f076b0

                                              SHA512

                                              27bd406032eb2018ee0e86c041efedf42b8d834425b9b27a56d15edc2807c453b45b305e83e52aebbfead3bead8fbfae30dbaa82e111b022c6040c7caa4708e5

                                            • C:\Users\Admin\AppData\Local\Temp\AwUoiW1w5.xml

                                              Filesize

                                              1KB

                                              MD5

                                              eb7dbd21bd310aab3a58dab341ba4bb3

                                              SHA1

                                              1bec80256daad15e4d2f2f085f57952f1e67d819

                                              SHA256

                                              3bcfe7683eb9915228feefa52ccad5432da5ee1ab8a851dc5ea76c9139621bdf

                                              SHA512

                                              bbd93d8c8fe9b7157055d4136ec64bf8c44a539d167949a2109004c60d1807ca13d9b94e0ea45d5787ae7a78fc6a7556abac3b9c26058e33eac343265e02c14d

                                            • memory/2236-14-0x0000000000400000-0x000000000065C000-memory.dmp

                                              Filesize

                                              2.4MB

                                            • memory/2236-17-0x0000000025030000-0x00000000250AE000-memory.dmp

                                              Filesize

                                              504KB

                                            • memory/2236-22-0x0000000000470000-0x00000000004DB000-memory.dmp

                                              Filesize

                                              428KB

                                            • memory/2236-23-0x0000000000400000-0x000000000045B000-memory.dmp

                                              Filesize

                                              364KB

                                            • memory/2236-32-0x0000000000400000-0x000000000065C000-memory.dmp

                                              Filesize

                                              2.4MB

                                            • memory/4072-0-0x0000000000400000-0x000000000065C000-memory.dmp

                                              Filesize

                                              2.4MB

                                            • memory/4072-1-0x0000000000400000-0x000000000046B000-memory.dmp

                                              Filesize

                                              428KB

                                            • memory/4072-4-0x00000000260A0000-0x000000002611E000-memory.dmp

                                              Filesize

                                              504KB

                                            • memory/4072-13-0x0000000000400000-0x000000000046B000-memory.dmp

                                              Filesize

                                              428KB