Analysis

  • max time kernel
    143s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 12:37

General

  • Target

    18bef1928a77b29a547f36612ba0a87e.exe

  • Size

    302KB

  • MD5

    18bef1928a77b29a547f36612ba0a87e

  • SHA1

    f8a7d5459f6336d99ad504711f1f515c61c6282b

  • SHA256

    78f7b9c841c9bd5c11d41cdb1fad523e1353563a9474db4eab2a02ce64bd3d41

  • SHA512

    31b0098634002ccc8c9ddda22a9c1f91f313ea47ad77e393def2d5a854fa0663265f6d3ba6fab2adf8bda204c89a05f642258eb171e94bf20ca408c35739d522

  • SSDEEP

    6144:Pv/wn5AvxBM+H9iK2qIA+GmW16wtpO6jMmQ:Pu+dioIADm3wS/m

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\18bef1928a77b29a547f36612ba0a87e.exe
    "C:\Users\Admin\AppData\Local\Temp\18bef1928a77b29a547f36612ba0a87e.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2708
    • C:\Users\Admin\AppData\Local\Temp\18bef1928a77b29a547f36612ba0a87e.exe
      C:\Users\Admin\AppData\Local\Temp\18bef1928a77b29a547f36612ba0a87e.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:3860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\18bef1928a77b29a547f36612ba0a87e.exe

    Filesize

    302KB

    MD5

    ef14ba7f44f9e0e67e02f8695ca19c62

    SHA1

    94f3fb08087fc660904aef48a15f9087e3c1867b

    SHA256

    127c5f54c424139b289596ebc4360ea8eea6e8138329edad0f56ce2582809c71

    SHA512

    50f27c528ac8aafe24338b45bdf98d12e31d9f97232e862bff5a72e0db1751209c2d8d0d90a427324a50f88f05d6f94cf039afa1cf29d30c699b37ba94e51a1a

  • memory/2708-0-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/2708-1-0x00000000015F0000-0x0000000001621000-memory.dmp

    Filesize

    196KB

  • memory/2708-2-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2708-14-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/3860-13-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/3860-15-0x00000000014E0000-0x0000000001511000-memory.dmp

    Filesize

    196KB

  • memory/3860-31-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB