Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 12:04

General

  • Target

    17f5cec31cb91db25ea8c6bf2c20df78.exe

  • Size

    59KB

  • MD5

    17f5cec31cb91db25ea8c6bf2c20df78

  • SHA1

    c02a2bd2333155a413c5415a9c64f8ebead825c7

  • SHA256

    93cd59a2746ecba4d0f5e3e5483b45a33c86920cee2225626363018bcfc8563c

  • SHA512

    89a014332f1f79a54fe3e2bc7dd2279cfe3a9562c6250e9d08b712e47aed03c074023ff448aca908b80cab36d37a6fdab4f24ae8a9ac4c49b7ac138315fe7f49

  • SSDEEP

    1536:leoCZh9t23YQoBkFFUD+kWcPD9Q3EPpWzphpa:Q9k3oBsLkWxEBiphI

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17f5cec31cb91db25ea8c6bf2c20df78.exe
    "C:\Users\Admin\AppData\Local\Temp\17f5cec31cb91db25ea8c6bf2c20df78.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3008
    • C:\Users\Admin\AppData\Local\Temp\17f5cec31cb91db25ea8c6bf2c20df78.exe
      C:\Users\Admin\AppData\Local\Temp\17f5cec31cb91db25ea8c6bf2c20df78.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:1688

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\17f5cec31cb91db25ea8c6bf2c20df78.exe

          Filesize

          59KB

          MD5

          67b246ededd00b252a4ca5fb76f303ad

          SHA1

          a302e914f90ec11bc8549c7f1e84ac95550a14f0

          SHA256

          47f4f7d380ba05e6b40ac4c2387e7e88b635ce477e52091d759d258ec154e38b

          SHA512

          e9b72293ee23e4f50753ae159abe74695180bca4ebf9122a60f851e6c4036effa94b19fb4a3df1ebad99a0336004d0a5fdfb9b3f2a272f621e24b7c5a09a986f

        • memory/1688-18-0x0000000000400000-0x000000000041D000-memory.dmp

          Filesize

          116KB

        • memory/1688-24-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/1688-29-0x00000000001F0000-0x000000000020D000-memory.dmp

          Filesize

          116KB

        • memory/1688-20-0x0000000000030000-0x000000000003F000-memory.dmp

          Filesize

          60KB

        • memory/1688-17-0x0000000000400000-0x000000000043D000-memory.dmp

          Filesize

          244KB

        • memory/1688-30-0x0000000000400000-0x000000000043D000-memory.dmp

          Filesize

          244KB

        • memory/3008-0-0x0000000000400000-0x000000000043D000-memory.dmp

          Filesize

          244KB

        • memory/3008-1-0x0000000000030000-0x000000000003F000-memory.dmp

          Filesize

          60KB

        • memory/3008-2-0x0000000000400000-0x000000000041D000-memory.dmp

          Filesize

          116KB

        • memory/3008-15-0x0000000000400000-0x000000000041D000-memory.dmp

          Filesize

          116KB

        • memory/3008-14-0x0000000000160000-0x000000000019D000-memory.dmp

          Filesize

          244KB