Analysis

  • max time kernel
    4s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 23:17

General

  • Target

    1fbb935726148c8b5a3456585d7c1a08.exe

  • Size

    133KB

  • MD5

    1fbb935726148c8b5a3456585d7c1a08

  • SHA1

    8646aaced62f77d4cd3cfaf1b5a2a059eddccff8

  • SHA256

    be16127b4c25e455576267fa4dd582f117cb734e4910cff04b97fbc6c2da973c

  • SHA512

    e0498f0166b895a3a4d5d1529a3b9b1b82073cf309b7666c87d559f253bc697a10a81d9ed6ba2bda20a8ac7f6628658d5fd441e621d3eadb3a6c11621413eaef

  • SSDEEP

    3072:/PsObP1UZ5glB6PRay8DEUQZmZ0bLMiAKiEUDROmCx2SjQ:/XbP1UXT2UCeLMrPROmCEKQ

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1fbb935726148c8b5a3456585d7c1a08.exe
    "C:\Users\Admin\AppData\Local\Temp\1fbb935726148c8b5a3456585d7c1a08.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Users\Admin\AppData\Local\Temp\1fbb935726148c8b5a3456585d7c1a08.exe
      C:\Users\Admin\AppData\Local\Temp\1fbb935726148c8b5a3456585d7c1a08.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:1264

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1fbb935726148c8b5a3456585d7c1a08.exe

    Filesize

    28KB

    MD5

    1a66337dd7c56029ffe90499ecb834a1

    SHA1

    48470b25c47e1ab38b89a1977bacb62435286a62

    SHA256

    b5c8045c6373edfa20226f2fb9d1ec2dc7bdd2c194d49a7e61041c3e36e42696

    SHA512

    25a3aa0b151ee47ac36d19d47855bf4a0c78cf65278fc61f713b1c8a463f59d55aa8f57bf88712b1937fe08de2893ed81ba6c825f2c86b5688068f1dcd19bddb

  • \Users\Admin\AppData\Local\Temp\1fbb935726148c8b5a3456585d7c1a08.exe

    Filesize

    1KB

    MD5

    03581400df06fa0cc40c2b5a4a658d12

    SHA1

    b28aeb94440486ef90ec93066a8461f06ab8ca1f

    SHA256

    36e17c642e0237730d52694bbf975bf52b5e2be71c87426223bedc3f953169b6

    SHA512

    1f4c76442a2c38d56f1251b81edb25b521884f8f81582c4018c09cb4867ed2ff435add68488d9f9ed542707e22751b5a5cb6eb6072c6fdaa595fc59f04125da7

  • memory/1264-18-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/1264-20-0x0000000000150000-0x0000000000171000-memory.dmp

    Filesize

    132KB

  • memory/1264-34-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2896-0-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2896-2-0x0000000000150000-0x0000000000171000-memory.dmp

    Filesize

    132KB

  • memory/2896-1-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2896-15-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2896-14-0x0000000001490000-0x0000000001516000-memory.dmp

    Filesize

    536KB