Analysis

  • max time kernel
    119s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 01:13

General

  • Target

    09b55b380dd2015e6539bf644750e257.exe

  • Size

    3.0MB

  • MD5

    09b55b380dd2015e6539bf644750e257

  • SHA1

    8a94c56bf9a7efca4b14a93594f3847a709074b0

  • SHA256

    a88d2892f7b34eec9b25ba6dab4c3af913a83a41acdb5dea1a3627925c9a0e24

  • SHA512

    39c0405395d65e1570402de953674258b10e69924357930b2bc3fd48fd3ea034f046158c143ce39225105ce6ebbf2de1beafc6025c7bbb25f35052d9ea0ab00c

  • SSDEEP

    98304:ooFoFoRfycakcibiqhMbMgOn7n0bcakcibiqhySnJ1UO6L+cakcibiqhMbr:XW2FydlirybMgOnkdlirgSDy+dlirybr

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09b55b380dd2015e6539bf644750e257.exe
    "C:\Users\Admin\AppData\Local\Temp\09b55b380dd2015e6539bf644750e257.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Users\Admin\AppData\Local\Temp\09b55b380dd2015e6539bf644750e257.exe
      C:\Users\Admin\AppData\Local\Temp\09b55b380dd2015e6539bf644750e257.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2148
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\09b55b380dd2015e6539bf644750e257.exe" /TN MXmKXYLpa01b /F
        3⤵
        • Creates scheduled task(s)
        PID:2716
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN MXmKXYLpa01b > C:\Users\Admin\AppData\Local\Temp\kjI7m2.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2032
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN MXmKXYLpa01b
          4⤵
            PID:2860

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\09b55b380dd2015e6539bf644750e257.exe

      Filesize

      22KB

      MD5

      6ef0402dd0da5d4a21dfc37957467416

      SHA1

      1c98e162f087508c72e69966408c9b55b7ebdc1a

      SHA256

      0d5bc41f9e153860564148ed38ba6fd8c128093068abb7236be4855269e98c80

      SHA512

      b75eabd75620eac963cb76ec3edde66a1a4cecea73b9da0db4f894338300f97251d4a0ac101b8f046fc070fcbd81d00244e85c164afa6d0600cca9f2a460fa29

    • C:\Users\Admin\AppData\Local\Temp\kjI7m2.xml

      Filesize

      1KB

      MD5

      f09040a9fdb4bb201ede3f76ca197ada

      SHA1

      52f05ef42c356da7c6f114e2f3ce6b652d6b963b

      SHA256

      6a965bb9c33808ebdea97d0967da962ec25a9408417d383f7f2c708ba405094f

      SHA512

      e86ddacf993c303479b9cd2899a2ad1629d44b4781f073d7e06be6b8ad289ab55de086b1e75e7fe4147a3ee50ba0ff2bbc5fb8ec686ed2097b6386ad5c6ba293

    • \Users\Admin\AppData\Local\Temp\09b55b380dd2015e6539bf644750e257.exe

      Filesize

      30KB

      MD5

      e88981c30e83b553482453d31f249d5e

      SHA1

      9d8caf9c8daac9b634c3e9345b026a5f58645c5d

      SHA256

      8cb14c6268858d83c5784bbb2d057e781e82e6ccea760274686e86da45416900

      SHA512

      9efc65b91f899ffd14b6679f1f21f7c129c7352d5923ae93c8fee3d835d610ec734b1e6a8e37d06b3fc9dfa17f8f1171b77659118be455a7c26a728628013448

    • memory/2036-2-0x0000000000200000-0x000000000027E000-memory.dmp

      Filesize

      504KB

    • memory/2036-1-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/2036-16-0x0000000023520000-0x000000002377C000-memory.dmp

      Filesize

      2.4MB

    • memory/2036-0-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2036-15-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/2036-53-0x0000000023520000-0x000000002377C000-memory.dmp

      Filesize

      2.4MB

    • memory/2148-20-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2148-22-0x0000000022D90000-0x0000000022E0E000-memory.dmp

      Filesize

      504KB

    • memory/2148-31-0x0000000000470000-0x00000000004DB000-memory.dmp

      Filesize

      428KB

    • memory/2148-26-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/2148-54-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB