Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 21:25

General

  • Target

    0464a3136a49d8cabd02d856f970c2fd.exe

  • Size

    133KB

  • MD5

    0464a3136a49d8cabd02d856f970c2fd

  • SHA1

    f050163446afd79b2fc3529d5ce0860acc5a76b0

  • SHA256

    80e84f5dcca926fd33422c60b9890f7a4ecc58770efa44ee0509183de296c3e1

  • SHA512

    705c282ba40537910f3bc4c06704861eedd3232b4851e1db4d552247afe940d6ef78d18147a6942dde2839956b9d09cae6022e7ff530bd9cabb80d8789c54ce9

  • SSDEEP

    3072:BA/oA0eWuz5WVAddMX6N67eSY2Alfqx4XGBJWSjQD3hmfpVw9Q:pA0eWbAdvSZAlyx4XGBMSED3YRVw9Q

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0464a3136a49d8cabd02d856f970c2fd.exe
    "C:\Users\Admin\AppData\Local\Temp\0464a3136a49d8cabd02d856f970c2fd.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Users\Admin\AppData\Local\Temp\0464a3136a49d8cabd02d856f970c2fd.exe
      C:\Users\Admin\AppData\Local\Temp\0464a3136a49d8cabd02d856f970c2fd.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2176

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\0464a3136a49d8cabd02d856f970c2fd.exe

    Filesize

    133KB

    MD5

    ebfbff6a4067b4bd949a1e958c7e39b6

    SHA1

    055427891bba3bc54f350b7d72bccdb879cf2c70

    SHA256

    78fdbdb5d35524acadd2bd24ac010002b9ce4a942ac3ba9cbf7c8f8fc0be52f8

    SHA512

    6d823fc5430e2a617dcd4af60cc624b42a87537e03001a4f4f24a0ec13e805feb5eb86ca51fa7ee9b4c0b2655645fff248730a00735aae8e982564b0aecc7b6a

  • \Users\Admin\AppData\Local\Temp\0464a3136a49d8cabd02d856f970c2fd.exe

    Filesize

    92KB

    MD5

    ac6029602b620045dac78af849a47b75

    SHA1

    8b09aae13f51bf031588955f4fa1982ff273a4dc

    SHA256

    8e3475df9c9254cf622d178ca5d9c96413c51ce16ee1cad90862b7b964cd31b0

    SHA512

    d6a6d1befe9832c3cbd3c1a1b7e03edce61dc36a7d11a3a6745766fee5d4462358236c93bb53f6bdf4120fe2dea07718c14369a2742d0a6af29f54e9f60a6b6c

  • memory/2176-16-0x0000000000150000-0x0000000000171000-memory.dmp

    Filesize

    132KB

  • memory/2176-19-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2176-32-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/3024-0-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/3024-15-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3024-10-0x0000000000150000-0x0000000000171000-memory.dmp

    Filesize

    132KB

  • memory/3024-1-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB