Analysis

  • max time kernel
    143s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/12/2023, 21:25

General

  • Target

    0464a3136a49d8cabd02d856f970c2fd.exe

  • Size

    133KB

  • MD5

    0464a3136a49d8cabd02d856f970c2fd

  • SHA1

    f050163446afd79b2fc3529d5ce0860acc5a76b0

  • SHA256

    80e84f5dcca926fd33422c60b9890f7a4ecc58770efa44ee0509183de296c3e1

  • SHA512

    705c282ba40537910f3bc4c06704861eedd3232b4851e1db4d552247afe940d6ef78d18147a6942dde2839956b9d09cae6022e7ff530bd9cabb80d8789c54ce9

  • SSDEEP

    3072:BA/oA0eWuz5WVAddMX6N67eSY2Alfqx4XGBJWSjQD3hmfpVw9Q:pA0eWbAdvSZAlyx4XGBMSED3YRVw9Q

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0464a3136a49d8cabd02d856f970c2fd.exe
    C:\Users\Admin\AppData\Local\Temp\0464a3136a49d8cabd02d856f970c2fd.exe
    1⤵
    • Deletes itself
    • Executes dropped EXE
    • Modifies system certificate store
    • Suspicious use of UnmapMainImage
    PID:4440
  • C:\Users\Admin\AppData\Local\Temp\0464a3136a49d8cabd02d856f970c2fd.exe
    "C:\Users\Admin\AppData\Local\Temp\0464a3136a49d8cabd02d856f970c2fd.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\0464a3136a49d8cabd02d856f970c2fd.exe

    Filesize

    54KB

    MD5

    0eba2bdde598c00b1e08a383ba38c60a

    SHA1

    c4e4b8ee54d08be7f04cbfb3c71d4217b7e2712c

    SHA256

    0e1f2da33a1b2bff123b5dccaf2d9cdd7a3788e5ba05808c6292158c4d51ad08

    SHA512

    8da57e9b2d0e10712bc9138218bd37bad3fef61b31eb40d773118d09eee89d43803fb871d9211c2b8cb215289adc9a63089dca0386e4d0bcd8ccdc0536b0b50b

  • memory/3832-0-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/3832-1-0x00000000000F0000-0x0000000000111000-memory.dmp

    Filesize

    132KB

  • memory/3832-2-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3832-13-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4440-16-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/4440-15-0x00000000001A0000-0x00000000001C1000-memory.dmp

    Filesize

    132KB

  • memory/4440-31-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB