Analysis

  • max time kernel
    15s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 06:05

General

  • Target

    10a43ca9131f1575adbc9473bcaa761a.exe

  • Size

    477KB

  • MD5

    10a43ca9131f1575adbc9473bcaa761a

  • SHA1

    fdeb43537f4838c37e40665113c597c5b74035d2

  • SHA256

    6a4d0d0533289a4772faecb5cf0b674529ca8932faaa51b4f58adc791f1afb23

  • SHA512

    7a56a971549f757c6e6e675de2e7447e1676b116c047837158aae2b66763e6f05621d4cb74d489598ec57a8fe1c84d15e20265ad5a884449763ab4aa96c93e14

  • SSDEEP

    6144:t515g515g515g515g5151515seP1ZVI51yZAv:N1M51yZAv

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Windows directory 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10a43ca9131f1575adbc9473bcaa761a.exe
    "C:\Users\Admin\AppData\Local\Temp\10a43ca9131f1575adbc9473bcaa761a.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:888
    • C:\exc.exe
      "C:\exc.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      PID:2184
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.freeav.com/
        3⤵
          PID:1684
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1684 CREDAT:275457 /prefetch:2
            4⤵
              PID:2620
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1684 CREDAT:734223 /prefetch:2
              4⤵
                PID:1580
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1684 CREDAT:996370 /prefetch:2
                4⤵
                  PID:2080
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe" http://www.freeav.com/
              2⤵
                PID:1676
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1676 CREDAT:275457 /prefetch:2
                  3⤵
                    PID:1220

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\WINDOWS\system.ini

                Filesize

                27KB

                MD5

                596ee3c2e6ef677d2a2bda8b84941c7e

                SHA1

                f10958e5e2118023a3d6a441e52c2f4aed57162f

                SHA256

                0cee20f9941195fe3b2b9611d68d28e9972c666b9d6b439531bb12a8446b7484

                SHA512

                e7c56de94ce8b38f8356b1fd4c76984dd2061bc76cb2ca500f4280805f6f7221e6a82dc71c7724df12a62b5f9c772685f350a37fa0f7d98edcc8ef3379481e1b

              • memory/888-275-0x0000000000400000-0x000000000040A000-memory.dmp

                Filesize

                40KB

              • memory/888-9-0x0000000002260000-0x000000000226A000-memory.dmp

                Filesize

                40KB

              • memory/888-1-0x0000000000400000-0x000000000040A000-memory.dmp

                Filesize

                40KB

              • memory/888-278-0x0000000002260000-0x000000000226A000-memory.dmp

                Filesize

                40KB

              • memory/888-277-0x0000000002260000-0x000000000226A000-memory.dmp

                Filesize

                40KB

              • memory/888-618-0x0000000000400000-0x000000000040A000-memory.dmp

                Filesize

                40KB

              • memory/888-2256-0x0000000000400000-0x000000000040A000-memory.dmp

                Filesize

                40KB

              • memory/2184-10-0x0000000000400000-0x000000000040A000-memory.dmp

                Filesize

                40KB

              • memory/2184-276-0x0000000000400000-0x000000000040A000-memory.dmp

                Filesize

                40KB

              • memory/2184-2258-0x0000000000400000-0x000000000040A000-memory.dmp

                Filesize

                40KB

              • memory/2184-5538-0x0000000000400000-0x000000000040A000-memory.dmp

                Filesize

                40KB