Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 19:43

General

  • Target

    021d6be5015380cc61c56da5fb3b173c.exe

  • Size

    33KB

  • MD5

    021d6be5015380cc61c56da5fb3b173c

  • SHA1

    716e2d8f327a1568a8b46fbe561ed133f93b41b6

  • SHA256

    27eb2029de50366fb6245e623c8eda3a811e1017f2a3b05e4b57a693d9647a6c

  • SHA512

    0f1328d2b8c3e9ab1bd3b64ee060b51e82537acd88b9bbd95235f53a54cdb6fbc8dfbee48c6f6c722166116df92b9a1d8646a719b1df00e6d8db560102fb6b67

  • SSDEEP

    768:DFnlhFtR4zrvmdqHoW3EzrEPekAUaB2K0:DhDoLmdKoW3Ezrdk

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1212
      • C:\Users\Admin\AppData\Local\Temp\021d6be5015380cc61c56da5fb3b173c.exe
        "C:\Users\Admin\AppData\Local\Temp\021d6be5015380cc61c56da5fb3b173c.exe"
        2⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates system info in registry
        • Suspicious behavior: RenamesItself
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2868
        • C:\Users\Admin\96036948-0.exe
          "C:\Users\Admin\96036948-0.exe"
          3⤵
          • Executes dropped EXE
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1640

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\96036948-0.exe

      Filesize

      33KB

      MD5

      021d6be5015380cc61c56da5fb3b173c

      SHA1

      716e2d8f327a1568a8b46fbe561ed133f93b41b6

      SHA256

      27eb2029de50366fb6245e623c8eda3a811e1017f2a3b05e4b57a693d9647a6c

      SHA512

      0f1328d2b8c3e9ab1bd3b64ee060b51e82537acd88b9bbd95235f53a54cdb6fbc8dfbee48c6f6c722166116df92b9a1d8646a719b1df00e6d8db560102fb6b67

    • memory/1212-22-0x0000000002DE0000-0x0000000002DE1000-memory.dmp

      Filesize

      4KB

    • memory/1640-15-0x0000000001320000-0x000000000135C000-memory.dmp

      Filesize

      240KB

    • memory/1640-14-0x0000000000120000-0x000000000012A000-memory.dmp

      Filesize

      40KB

    • memory/1640-16-0x0000000000120000-0x000000000012A000-memory.dmp

      Filesize

      40KB

    • memory/1640-18-0x0000000001320000-0x000000000135C000-memory.dmp

      Filesize

      240KB

    • memory/2868-0-0x0000000000B70000-0x0000000000BAC000-memory.dmp

      Filesize

      240KB

    • memory/2868-2-0x00000000000E0000-0x00000000000EA000-memory.dmp

      Filesize

      40KB

    • memory/2868-3-0x00000000000E0000-0x00000000000EA000-memory.dmp

      Filesize

      40KB

    • memory/2868-4-0x0000000000B70000-0x0000000000BAC000-memory.dmp

      Filesize

      240KB