Analysis

  • max time kernel
    94s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/12/2023, 19:19

General

  • Target

    0182df5608b0efcbe798443a051c437b.exe

  • Size

    133KB

  • MD5

    0182df5608b0efcbe798443a051c437b

  • SHA1

    6b59868d86b4d01b3ee4d85cb44c7c2466053637

  • SHA256

    69b2b9033b6af7257265182851ceac563ad92935dbef3a793107b3eb9bc389db

  • SHA512

    a86172a73fb5e91f7b6690f0fd6b4e5f41529431548512e0ddc4f30f1f1763242ed2fc22b6193d6a7ca9974a08a1060e8498d84dd3151c1d61f38037ce8bfc02

  • SSDEEP

    3072:3vx+dQmlD9y5Mwqu8C3tOeGOlkoxRZuL1KLUSOQHmUHdlEpS0nQ:pCQm3yxqM3yii2USndip1Q

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0182df5608b0efcbe798443a051c437b.exe
    "C:\Users\Admin\AppData\Local\Temp\0182df5608b0efcbe798443a051c437b.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3304
    • C:\Users\Admin\AppData\Local\Temp\0182df5608b0efcbe798443a051c437b.exe
      C:\Users\Admin\AppData\Local\Temp\0182df5608b0efcbe798443a051c437b.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:4536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\0182df5608b0efcbe798443a051c437b.exe

    Filesize

    133KB

    MD5

    59020a7a94195f5d79f920179c3d85a7

    SHA1

    d93c0547cee04d34a5c87031a169b115c8a94ef0

    SHA256

    6c6e6584eb34f05d757d4adf5fe7b9f3d8f9933e5df130e731b2cb0fbff50a30

    SHA512

    b43d08d0afa8a643b98a6bdd6af32810ed9857f512e11299637cc136c57357d1b85db325b90ec2824ff56f25c3e356b15552f22f7d7b09a462c57c7a8bbe35a5

  • memory/3304-0-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/3304-1-0x00000000001D0000-0x00000000001F1000-memory.dmp

    Filesize

    132KB

  • memory/3304-2-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3304-13-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4536-14-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/4536-16-0x00000000001A0000-0x00000000001C1000-memory.dmp

    Filesize

    132KB

  • memory/4536-15-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4536-32-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB