Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 03:29

General

  • Target

    0cfce5c42de6ad6e3d91bf3943274e16.exe

  • Size

    133KB

  • MD5

    0cfce5c42de6ad6e3d91bf3943274e16

  • SHA1

    47109708b96d72579769ad640b8006e463b69405

  • SHA256

    b54e4f7e108503d7b41ca3e9551f3dae71bc5745fd3afaabb8a553ac765f56e4

  • SHA512

    5b8e17ecdb6f3397d90b5ed9292d7398f4b7f8981aa8a37b3a4e8c020131a93088bbe5e35c1eba5d9025f50ffd9e91e45af9e51e6d6348da20a4952119a26b75

  • SSDEEP

    3072:2XTyrph33Q7D520taDoWOgQB9jUpN+d+6Z49A5ggfR+KuZdKQDd4Q:+unQR20gDoWO7FUuXZjRCZd1R4Q

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0cfce5c42de6ad6e3d91bf3943274e16.exe
    "C:\Users\Admin\AppData\Local\Temp\0cfce5c42de6ad6e3d91bf3943274e16.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Users\Admin\AppData\Local\Temp\0cfce5c42de6ad6e3d91bf3943274e16.exe
      C:\Users\Admin\AppData\Local\Temp\0cfce5c42de6ad6e3d91bf3943274e16.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:1976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\0cfce5c42de6ad6e3d91bf3943274e16.exe

    Filesize

    133KB

    MD5

    40ec7a9e112e60b74dca68f6c1e4a685

    SHA1

    9b41addb1c479297dc8c34ed94e821db70594e59

    SHA256

    e1a775096dab9e419ba45fde278b399799f17560909a47911185cb0ca4093303

    SHA512

    e30b1470e0940db73a7a9b02dc67731d36369425e0c257e1c4d9b241b4aef4d657c3fe5ee51ccef3c6519ae493b28e349c622bdd3939081e150c9d63f76a466b

  • memory/1976-16-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/1976-17-0x0000000000150000-0x0000000000171000-memory.dmp

    Filesize

    132KB

  • memory/1976-42-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/1992-0-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/1992-2-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1992-1-0x0000000000150000-0x0000000000171000-memory.dmp

    Filesize

    132KB

  • memory/1992-14-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB