Analysis

  • max time kernel
    137s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 23:36

General

  • Target

    203783e66ad443e1652665623b215662.exe

  • Size

    605KB

  • MD5

    203783e66ad443e1652665623b215662

  • SHA1

    37ff1a2adc5ba94f34ecef3da6368406bbdc9796

  • SHA256

    7e101d932a7ab7fd3c7768680bcaadd359fc9320d5a1eba0d7bdb7e69f9b8033

  • SHA512

    764468292803e0468c85723e5627decb43efb245dca56bacc353185e44ec92b630870fc7e1ce610921095aeb37080e849aa1e30c215848feb785575199638f00

  • SSDEEP

    12288:tA7jNa7b4pnef0y9NfHVVmNxvbcsTdVNG/Mxm:i7JA45efHqNNbcspVNGkM

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\203783e66ad443e1652665623b215662.exe
    C:\Users\Admin\AppData\Local\Temp\203783e66ad443e1652665623b215662.exe
    1⤵
    • Deletes itself
    • Executes dropped EXE
    • Modifies system certificate store
    • Suspicious use of UnmapMainImage
    PID:3028
  • C:\Users\Admin\AppData\Local\Temp\203783e66ad443e1652665623b215662.exe
    "C:\Users\Admin\AppData\Local\Temp\203783e66ad443e1652665623b215662.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\203783e66ad443e1652665623b215662.exe

    Filesize

    385KB

    MD5

    1d7fd6460045f3cbc2f0367ae30c8ae6

    SHA1

    6e7ded56b44be6f596b38084257742a81e8d3305

    SHA256

    49d92ebc4a34f61d565917be646e522326e486ba8a8bf0b878b214a11d87de37

    SHA512

    73cebf326dd3034a4f00d29a4f44245225de3a631dd09ec0d93cc6774403c573571723605ed1be9a27beedd7a3c2f9c5a39c6088e63ded230a36ade959b10b90

  • \Users\Admin\AppData\Local\Temp\203783e66ad443e1652665623b215662.exe

    Filesize

    382KB

    MD5

    1b4d3570d12a056f0f38fcea67c87ab5

    SHA1

    17c1886b6f9ec34c4bf1a04cc26c42909cc5626d

    SHA256

    2dda1fce70fae63388bf7bb83d6d1f566b84a3fca40177107be735252ae17f85

    SHA512

    aaf491017aab968ee839ef44d8007fcea92bf4220f2de4ca99e45565d5789f65992838432ae227255582417868a05e8d565bb3dc8e29f7211f97923be58fc84d

  • memory/1920-0-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/1920-2-0x0000000000160000-0x0000000000191000-memory.dmp

    Filesize

    196KB

  • memory/1920-1-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/1920-20-0x0000000022F70000-0x0000000023050000-memory.dmp

    Filesize

    896KB

  • memory/1920-16-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/3028-17-0x0000000000340000-0x0000000000371000-memory.dmp

    Filesize

    196KB

  • memory/3028-22-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/3028-35-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB