Analysis

  • max time kernel
    120s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 14:04

General

  • Target

    1ae67fc744840dc588d1f934a17d4f19.exe

  • Size

    133KB

  • MD5

    1ae67fc744840dc588d1f934a17d4f19

  • SHA1

    396130800e9263353752d0f5d12b4cb52711d717

  • SHA256

    c520b8dbd429448c8f1694a93f1a3a0b022676d0ea40dc3784e4895a927bf82e

  • SHA512

    157e99917ed8a39f04616dfa74e014f201e30bf06fd975b032b1cf9a45a1aec1e2ee744eb12c3bd2b4b12ac8f7220aadc71df7876d951e3d57a7f5663488d9a7

  • SSDEEP

    3072:lYAa2DBxQHSnJkxhdHCZMm3Wh6SCzVqgQ:y/2txQT3diam3tggQ

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ae67fc744840dc588d1f934a17d4f19.exe
    "C:\Users\Admin\AppData\Local\Temp\1ae67fc744840dc588d1f934a17d4f19.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1092
    • C:\Users\Admin\AppData\Local\Temp\1ae67fc744840dc588d1f934a17d4f19.exe
      C:\Users\Admin\AppData\Local\Temp\1ae67fc744840dc588d1f934a17d4f19.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:1740

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\1ae67fc744840dc588d1f934a17d4f19.exe

          Filesize

          133KB

          MD5

          cddf856ec76547b8b575c0b267a4eead

          SHA1

          f3ad041a745db49491df63f296707cfdbba9a747

          SHA256

          3bdb6648bce690436be04d78a92e07560ce12d6f99ca8d7a28e0194694d5a114

          SHA512

          7d0495ae493d15e527a4da8d3b323e285ab3397fe5ba50321d01a43f20af884920b7ef72b71eea1c9ab77d85c79f33d7e3c4c600a576a1a7e659957d953ef5bc

        • memory/1092-0-0x0000000000400000-0x0000000000486000-memory.dmp

          Filesize

          536KB

        • memory/1092-2-0x00000000001E0000-0x0000000000201000-memory.dmp

          Filesize

          132KB

        • memory/1092-1-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/1092-13-0x0000000001490000-0x0000000001516000-memory.dmp

          Filesize

          536KB

        • memory/1092-15-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/1740-20-0x0000000000150000-0x0000000000171000-memory.dmp

          Filesize

          132KB

        • memory/1740-41-0x0000000000400000-0x0000000000486000-memory.dmp

          Filesize

          536KB