Analysis

  • max time kernel
    142s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 05:53

General

  • Target

    10710e2cba6014d64cdf7f4332322662.exe

  • Size

    605KB

  • MD5

    10710e2cba6014d64cdf7f4332322662

  • SHA1

    716bbaa52f2dc41fd9a1e0dcfa1f830993b061d6

  • SHA256

    a4b036c973d6c458078c2c42c0428f1c0a87ad3e062453b7754c42d35698de76

  • SHA512

    f87a9f862d05023a94e97501505159b7aa91dd091ebcbf60aacb3ede131044767eac065087c4437bd78842bec22240b7b616dec1b47c78ebb4cf89f811b6602d

  • SSDEEP

    12288:ab/5M9NcKJL7F1yxG/rOAmcTB97pfclBihGRm:ab2YSKxTHkv7pEBk

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10710e2cba6014d64cdf7f4332322662.exe
    "C:\Users\Admin\AppData\Local\Temp\10710e2cba6014d64cdf7f4332322662.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4476
    • C:\Users\Admin\AppData\Local\Temp\10710e2cba6014d64cdf7f4332322662.exe
      C:\Users\Admin\AppData\Local\Temp\10710e2cba6014d64cdf7f4332322662.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\10710e2cba6014d64cdf7f4332322662.exe

    Filesize

    260KB

    MD5

    9f1443d8eef8598a5408655744ef9e65

    SHA1

    9dde5cbbf08f020adf04c8b05421d5f9746c0247

    SHA256

    82767ebcbf4691fa6f6f14be37d48d329259c6e74f596554535af68dbff58de7

    SHA512

    2d8fe92a480fd9ae879a12ba70b9c235871f57a64729e1ad621f3fb45e5374f125221eaa4f6d018d4294a91169d134f221b8fa26430edfc038636637ef3a42ba

  • memory/2020-14-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/2020-15-0x00000000014E0000-0x0000000001511000-memory.dmp

    Filesize

    196KB

  • memory/2020-16-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2020-30-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/4476-0-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/4476-1-0x0000000001520000-0x0000000001551000-memory.dmp

    Filesize

    196KB

  • memory/4476-2-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/4476-13-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB