Analysis

  • max time kernel
    119s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 00:41

General

  • Target

    08daee817b45ea17a1fb3cfcc6cda32f.exe

  • Size

    133KB

  • MD5

    08daee817b45ea17a1fb3cfcc6cda32f

  • SHA1

    8b84a199855cfd4c26ccc3983f7d17cb918f0475

  • SHA256

    08b33a9f8de461362651077bc81ab64452ce6b4d01cd4b8f500b19243ee83b2c

  • SHA512

    08317524c1256ac25dcebaaabf4ba6ba711f0eff4b95d4b5702ffbc69d48d516921bd163737a3800c9a2aca490f22c67bfed33713a8511deb5996f462f0f67ce

  • SSDEEP

    3072:u/TRak83kGmwksD+EsIe5uU/Im+qFTeJWJZcxhTcOJh41TQai1odSWQ:uT4k8UGGYsIY/ICFTeJWQxhoOJhCQav8

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\08daee817b45ea17a1fb3cfcc6cda32f.exe
    "C:\Users\Admin\AppData\Local\Temp\08daee817b45ea17a1fb3cfcc6cda32f.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2460
    • C:\Users\Admin\AppData\Local\Temp\08daee817b45ea17a1fb3cfcc6cda32f.exe
      C:\Users\Admin\AppData\Local\Temp\08daee817b45ea17a1fb3cfcc6cda32f.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\08daee817b45ea17a1fb3cfcc6cda32f.exe

    Filesize

    29KB

    MD5

    57f86991ad7611a12845738e9aa468a8

    SHA1

    84d22a5c1cb683b4df997b21e0b215cccb362973

    SHA256

    c32ad738f988fe734f6c98c679dad00b1254dc87afd9e49913c4db4dc589b314

    SHA512

    e21dd3f2fa1260aa61195dd2f8698ee719af13aa3f0f10756e1eff69aef6bdf6c968b9e52187d433fd2040aee43ec8cfa23fd503bc0f4876a7f201864fbdd358

  • \Users\Admin\AppData\Local\Temp\08daee817b45ea17a1fb3cfcc6cda32f.exe

    Filesize

    28KB

    MD5

    a19f7255926f58e5af01a29841c1f512

    SHA1

    f906867820b3168053bf7498b869d0fdf6fbbb04

    SHA256

    3ad03b604718083903089a2d22cd11e05c0e65e6e97d6fa0a4b3a2ba30455526

    SHA512

    82378408b4fc234a4d31d839570a052df45f08cd7d4c5457c5874152c101b55f42bc3cbc35f1454754190234efcbed43052c1afa4de794761d2b277a61fe3645

  • memory/2460-0-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2460-2-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2460-18-0x0000000002D40000-0x0000000002DC6000-memory.dmp

    Filesize

    536KB

  • memory/2460-15-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2460-1-0x00000000001F0000-0x0000000000211000-memory.dmp

    Filesize

    132KB

  • memory/2460-42-0x0000000002D40000-0x0000000002DC6000-memory.dmp

    Filesize

    536KB

  • memory/2728-16-0x0000000000150000-0x0000000000171000-memory.dmp

    Filesize

    132KB

  • memory/2728-20-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2728-43-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB