Analysis

  • max time kernel
    7s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2023 06:22

General

  • Target

    10efe8ea205b7f0d4248fe499acc3fc9.exe

  • Size

    975KB

  • MD5

    10efe8ea205b7f0d4248fe499acc3fc9

  • SHA1

    07a7a7c90ba3ec9615668255d6a4fb816d10b2d9

  • SHA256

    a4bd7a14d8880dcd896ffc5a1452c49c376bf15bf0b2dd5c0f985f416ec31e5b

  • SHA512

    d3b6d2f00f1f4f15ae763c38e48649346d4e631db62c869b9ffe90048c42e3970466f44cff0da08fcf90ff30bddbdba1fdd5dc6f908060b40bf2a4a0330db123

  • SSDEEP

    12288:hu7Y7O4wXvNpWEbfmbEsnjDFXKTYvnqFoQi2kn3tQbJ:hpBRkYvwDmdQbJ

Score
8/10
upx

Malware Config

Signatures

  • Downloads MZ/PE file
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10efe8ea205b7f0d4248fe499acc3fc9.exe
    "C:\Users\Admin\AppData\Local\Temp\10efe8ea205b7f0d4248fe499acc3fc9.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4604
    • C:\Program Files\DriverUpdate\DriverUpdate.exe
      "C:\Program Files\DriverUpdate\DriverUpdate.exe" -installscan
      2⤵
        PID:4536
        • C:\Users\Admin\AppData\Local\SlimWare Utilities Inc\DriverUpdate\SCP-setup.exe
          "C:\Users\Admin\AppData\Local\SlimWare Utilities Inc\DriverUpdate\SCP-setup.exe"
          3⤵
            PID:2224
      • C:\Windows\system32\msiexec.exe
        C:\Windows\system32\msiexec.exe /V
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2268
        • C:\Windows\System32\MsiExec.exe
          C:\Windows\System32\MsiExec.exe -Embedding B30A2B0EDABB05CBE98F8DB04D5B47EE
          2⤵
            PID:864
        • C:\Program Files\SlimWare Utilities\Services\SlimWare.Services.exe
          "C:\Program Files\SlimWare Utilities\Services\SlimWare.Services.exe"
          1⤵
            PID:4988
          • C:\Program Files\SlimWare Utilities\Services\SlimWare.Session.exe
            "C:\Program Files\SlimWare Utilities\Services\SlimWare.Session.exe" -Embedding
            1⤵
              PID:5112
            • C:\Windows\system32\wbem\unsecapp.exe
              C:\Windows\system32\wbem\unsecapp.exe -Embedding
              1⤵
                PID:2240

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9A19ADAD9D098E039450ABBEDD5616EB_90968CAB679DC8A66D51322A089E7CBE

                Filesize

                1KB

                MD5

                db9e3e672f17b7bba997823ad00deacd

                SHA1

                fe821c385ea582d611fe931726ccfca0845bf5b6

                SHA256

                1a6834068d91f8b25f4632c442efb6f5b196980d2d45d7ee2bd5d8d179e4db1e

                SHA512

                c851e52777ba73710d665845bb50c522f2a18ab1fb97a008e81f55c4c8c53a91bb88bd52f61c118a00bd47b7fcf949aa02c045a9da8e6c1dd3832b36f9724f40

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9A19ADAD9D098E039450ABBEDD5616EB_90968CAB679DC8A66D51322A089E7CBE

                Filesize

                398B

                MD5

                c1c35e7bbcd76a8683f07b4f297d1b49

                SHA1

                d6530eccfcfee0512d1f28254e833618085bef3f

                SHA256

                9c8987d9773dd517ed78736fc45ad6ff274a29deb2444913669f4530c1e0813a

                SHA512

                e12cf050a67785d6a6abc94274a1079bc481005e701763fd6b84e60aace53fa5892daee41b69ae838190f2bc45fa4ab2264ff932b10f922ea967f8d8e55839cd

              • C:\Users\Admin\AppData\Local\Temp\swu441D.tmp.msi

                Filesize

                175KB

                MD5

                1dbc65c4d4d71ad7feec2dffd3d70b67

                SHA1

                49f0536f39b1ba47edbfaff7699088e693463adb

                SHA256

                b9417c51026971e26d70a11273d4b7d13e1acc48be37c6832ea7691c539a13d6

                SHA512

                3ca4d1b1d45bf6bd0a20e933850280dd80c9a835b096d8130baaac27061821c79a2430112f3122e4b5a3be53f65bcde81a1dae6e31c340a6edb60946075d03fb

              • C:\Windows\Installer\MSI61B7.tmp

                Filesize

                92KB

                MD5

                cf6d6051fc1d00f5bf91b6b3730f7b24

                SHA1

                4d048361e9da975340d60ddbfe553dd1f81617bd

                SHA256

                2236e80b649065707cbbd6fe673ed8309e2658a65d3ee2059a7a22dc685bbfbf

                SHA512

                537071166d635ac3f129e90dd81a7ee34f1d97f87761f547c66b4e5f0b8c63a19be5cce76ef90f89045c946e581ebd774363441dab259108e0d2de3e24807dbd

              • memory/4536-136-0x00000000053E0000-0x000000000563D000-memory.dmp

                Filesize

                2.4MB

              • memory/4536-160-0x00000000053E0000-0x000000000563D000-memory.dmp

                Filesize

                2.4MB

              • memory/4536-161-0x00000000053E0000-0x000000000563D000-memory.dmp

                Filesize

                2.4MB

              • memory/4536-162-0x00000000053E0000-0x000000000563D000-memory.dmp

                Filesize

                2.4MB

              • memory/4536-175-0x00000000053E0000-0x000000000563D000-memory.dmp

                Filesize

                2.4MB

              • memory/4536-181-0x00000000053E0000-0x000000000563D000-memory.dmp

                Filesize

                2.4MB