Analysis

  • max time kernel
    152s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 06:38

General

  • Target

    113b3cceadf45f8661b08ba5ca9acc36.exe

  • Size

    302KB

  • MD5

    113b3cceadf45f8661b08ba5ca9acc36

  • SHA1

    3ddda461a75252470169f9e8e8b9c556c1d709d8

  • SHA256

    904e7a01ba52f5d0c338b1b9f1912c67739b3a1d18351dab33316cf3d171e8d9

  • SHA512

    d399528d71eab1afcc21cb352034b9d9de3aff22afaffc55635ebd2fdbb4d36ba375eb55f6ddbc6b998cc128cdf6cb66af0aebe5a0902e22163649d1af0a0601

  • SSDEEP

    6144:CI7wlyRXMKNEz+ElGXMyC5ZK3Z1RybzjOn4mQ:CKw+Xd2z+xhCSRym

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\113b3cceadf45f8661b08ba5ca9acc36.exe
    "C:\Users\Admin\AppData\Local\Temp\113b3cceadf45f8661b08ba5ca9acc36.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:864
    • C:\Users\Admin\AppData\Local\Temp\113b3cceadf45f8661b08ba5ca9acc36.exe
      C:\Users\Admin\AppData\Local\Temp\113b3cceadf45f8661b08ba5ca9acc36.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:700

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\113b3cceadf45f8661b08ba5ca9acc36.exe

          Filesize

          302KB

          MD5

          467cb18aed4c826e6aa3337cf7c0bd97

          SHA1

          d474cb4257a0ea089da21160c75373548913f93c

          SHA256

          a5422a58f1e8fbf713a9d58e15efd4cbfc32c923b544be45eda120dbf2d7a224

          SHA512

          3a555dcac3f30e96a2d3d90086058d4e0f59fef82735f2570ec45b18c2bce322515e901069a4407e3edc713058632fdd51ab23e88b80a5401b6683e42d87e70d

        • memory/700-13-0x0000000000400000-0x00000000004E0000-memory.dmp

          Filesize

          896KB

        • memory/700-15-0x00000000014E0000-0x0000000001511000-memory.dmp

          Filesize

          196KB

        • memory/700-30-0x0000000000400000-0x00000000004E0000-memory.dmp

          Filesize

          896KB

        • memory/864-0-0x0000000000400000-0x00000000004E0000-memory.dmp

          Filesize

          896KB

        • memory/864-1-0x00000000014E0000-0x0000000001511000-memory.dmp

          Filesize

          196KB

        • memory/864-2-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/864-14-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB