Analysis

  • max time kernel
    165s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 07:46

General

  • Target

    1285cb3b182dc6acd415b5cb9e43644b.exe

  • Size

    2.6MB

  • MD5

    1285cb3b182dc6acd415b5cb9e43644b

  • SHA1

    c7e99f6d70b1f46e7680eb28336165b345fc04ec

  • SHA256

    4a03ab68dec790597c000f32d4f29df0938ed56edf4adec7fb2360c408ae1371

  • SHA512

    a471186afbea0c333b28cd9a8a745fec57ca0d2fe4fc49b813b72d4ce5d79af4eb917131ba6135f188149a71820a7c9cb79a7d32be82f25cb396f76c74dc380e

  • SSDEEP

    49152:pevXIpBBa0nFLAoUDS0hHdl/hEy6872VFc1EzGU5W2d034xtay3:gX2A2uolS9bCuB+xN3

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1285cb3b182dc6acd415b5cb9e43644b.exe
    "C:\Users\Admin\AppData\Local\Temp\1285cb3b182dc6acd415b5cb9e43644b.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1284
    • C:\Users\Admin\AppData\Local\Temp\1285cb3b182dc6acd415b5cb9e43644b.exe
      C:\Users\Admin\AppData\Local\Temp\1285cb3b182dc6acd415b5cb9e43644b.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:4504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1285cb3b182dc6acd415b5cb9e43644b.exe

    Filesize

    2.6MB

    MD5

    775e9ff5f60d4f976c35bd3f4460e303

    SHA1

    a459b1e662d38962a37d12b58b33ff0973150ffb

    SHA256

    a2d11383455006aa2f79106005c7e3ef436ad789ddbc40a942a82da63d1598e0

    SHA512

    f6dbb77ee51ff0dac70ce2fe8243bc43de2e8bc43937b573ef929076e284c083040ab1b6746bccd8b03970dc352b60160fbab0d21251853d27a4efd369c07888

  • memory/1284-0-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/1284-1-0x0000000002370000-0x00000000025CA000-memory.dmp

    Filesize

    2.4MB

  • memory/1284-2-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/1284-13-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/4504-14-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/4504-15-0x00000000023C0000-0x000000000261A000-memory.dmp

    Filesize

    2.4MB

  • memory/4504-27-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB