Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 23:22

General

  • Target

    1fdd5d804bbfa29c2d0c9e2fa48eff20.exe

  • Size

    537KB

  • MD5

    1fdd5d804bbfa29c2d0c9e2fa48eff20

  • SHA1

    1ce7a79830095e038808aeb0fdd902207a32cdd7

  • SHA256

    16b6c962d6163340f35795e204fb05d0ff6a05f6572039c1c66e00054954acd6

  • SHA512

    9d48d8349606e8614d84e6144afa9c6cc3e7605c9959c142ac616a5b90faab5bd459dc84d85c085cc78fc9e24d11cb917eaf2fd5078680607b8c6c7993760437

  • SSDEEP

    12288:S6Wq4aaE6KwyF5L0Y2D1PqLlc8x2HcezkMkBgWBcRjZI:QthEVaPqLlc22Hbzk7BgWBcV2

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1fdd5d804bbfa29c2d0c9e2fa48eff20.exe
    "C:\Users\Admin\AppData\Local\Temp\1fdd5d804bbfa29c2d0c9e2fa48eff20.exe"
    1⤵
    • Modifies system certificate store
    PID:1572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    08bee9cbd5c0d22e5d240040b3b953a8

    SHA1

    7917ebb342f67bd3bc462b2181f2a56cad06cb3c

    SHA256

    83b0adb143e0efa5028bf9c5d62680b1f98ba9956f4b54e399f0d72583cf1352

    SHA512

    b748ac5fd2f97559d7a1ac18dc9be3188111481026362d69ad9425c041e442dee203910b657aaa623de0e2ea7c7ca034a61ea841930961ca5e2dac70ea884f83

  • C:\Users\Admin\AppData\Local\Temp\Cab5DF3.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar5E05.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\t_54\ttm.png

    Filesize

    17KB

    MD5

    53dbabe0643c1717507402d7ed0f5f6c

    SHA1

    9243adddefad63267ce5ed5ce905e3edd98171be

    SHA256

    94a8c1918d49cafbfb4bb0c3b86737201cc792449fbd37925bea66dd84157a63

    SHA512

    14618558bd7838dc26b3b0063c2b7010005e5db2e873bfdd2edbb8b46dd9332ccebd133e858478c0f968e5860afe400c4635df73c5c701de68df833957863d08

  • memory/1572-0-0x0000000000400000-0x00000000004B6000-memory.dmp

    Filesize

    728KB

  • memory/1572-136-0x0000000000400000-0x00000000004B6000-memory.dmp

    Filesize

    728KB

  • memory/1572-262-0x0000000000400000-0x00000000004B6000-memory.dmp

    Filesize

    728KB