Analysis

  • max time kernel
    118s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 21:57

General

  • Target

    1dc6c477aac51a82d2185af6f36a0cd9.exe

  • Size

    1003KB

  • MD5

    1dc6c477aac51a82d2185af6f36a0cd9

  • SHA1

    189ea91a5d3c7fbcf402723d8e9e7f102376087c

  • SHA256

    c7294b7f9c5f8168182299ea0c4d77122d59ea3f3eed0d22997f621469166d64

  • SHA512

    319c57fffb685a149845ab04016beb4d829ee0a6a8c103c4dca363e786fce5b9b0334807114783a6be348ed175f554677b398e7ae98998b66990b42347d8e14b

  • SSDEEP

    24576:0DP28XcUZ004EQzfvmwDXK2frNkziacRbT0RbTr/Rm:MP28sUZ00Zwfvmw+SNkzURnGbTr/4

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1dc6c477aac51a82d2185af6f36a0cd9.exe
    "C:\Users\Admin\AppData\Local\Temp\1dc6c477aac51a82d2185af6f36a0cd9.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Users\Admin\AppData\Local\Temp\1dc6c477aac51a82d2185af6f36a0cd9.exe
      C:\Users\Admin\AppData\Local\Temp\1dc6c477aac51a82d2185af6f36a0cd9.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:1352
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\1dc6c477aac51a82d2185af6f36a0cd9.exe" /TN Nnb8kaFf43a4 /F
        3⤵
        • Creates scheduled task(s)
        PID:2948
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN Nnb8kaFf43a4 > C:\Users\Admin\AppData\Local\Temp\o4TIvyE.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2580
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN Nnb8kaFf43a4
          4⤵
            PID:2608

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\1dc6c477aac51a82d2185af6f36a0cd9.exe

      Filesize

      150KB

      MD5

      a3faa61496e1591ce93941c7c090c1a1

      SHA1

      10bbc2239694a7446072c198de5516cd92b086fe

      SHA256

      f40c1e1758bc80cf335b90206a83fe14a9d6f1d6e2942d04e8dfafb362eb3935

      SHA512

      f06baf6fab0263d14ad7f50169e18c7a80e96efef4fdfb87ef432f86e950ed60837a5b48e327cb30265ce42d3cb4419094a0d07af0705c2573baf234ca2bc9be

    • C:\Users\Admin\AppData\Local\Temp\1dc6c477aac51a82d2185af6f36a0cd9.exe

      Filesize

      96KB

      MD5

      f58395f4b70a0394a297db1a1a23c21e

      SHA1

      8a7f705002961f55ca413b6a7bf995e3f2d9495e

      SHA256

      d4d008a4a5d657f25cc0d750cb9c5d9541ac013b5023bed50f784c79d455cf17

      SHA512

      20ae16b78fbaf9c99c3b37aa0aa9697adde149ebeeed16fe81f3ac3b22b0e3040feb92f37eb70faec98e26759ce5431f6a11945f75e32a1fbd9256442dccbe06

    • C:\Users\Admin\AppData\Local\Temp\o4TIvyE.xml

      Filesize

      1KB

      MD5

      dda483a7ccb3b5a5a2b48e7124e9dd94

      SHA1

      bdd7d3e9f664f48c63b21f313cd2b322e52ee0be

      SHA256

      ea7efd50c76206d155bcb0ffcde06d84aba2b03bd6ef474233cc0f8de09f4365

      SHA512

      4a8560ad3750712c6abbbc497c17465e2f52844bc880e8bb964c8292f61f3d4a485b21076cceff58a55deba87c71721d4a2ca3b067b5411c800b20403e5cd65a

    • \Users\Admin\AppData\Local\Temp\1dc6c477aac51a82d2185af6f36a0cd9.exe

      Filesize

      262KB

      MD5

      573bc8b11efd294e6785d9fbc15c2e4a

      SHA1

      5f3f51d0db7ff08784214a4c02e823393564c8d5

      SHA256

      5e805617d364f800377162ebc22556f65f2246959c071251e8932ad3ad882e13

      SHA512

      0ea20e0cd6db25b8c899a29148d9e7df678cca70426f8a05f236cf4946dd72104fb6afc5542919d9766ca0ecd7af070e13631c1e64b55d5dcbe3bbdbce760091

    • memory/1352-25-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/1352-17-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/1352-19-0x0000000000380000-0x00000000003FE000-memory.dmp

      Filesize

      504KB

    • memory/1352-30-0x0000000000470000-0x00000000004DB000-memory.dmp

      Filesize

      428KB

    • memory/1352-53-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/3068-16-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/3068-4-0x0000000022DF0000-0x0000000022E6E000-memory.dmp

      Filesize

      504KB

    • memory/3068-0-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/3068-1-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB