Analysis

  • max time kernel
    138s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 22:44

General

  • Target

    3b40cf3b84766eb09ae4a8f5cbd4d52e.exe

  • Size

    10.2MB

  • MD5

    3b40cf3b84766eb09ae4a8f5cbd4d52e

  • SHA1

    79703ba86fb0815f6ceeebbd93fd64af4d65e51e

  • SHA256

    3a0e301f6996b1d2ec33b992d46bed0eed1272cee5447c3e1d53e933df6cd09f

  • SHA512

    0151140ef80e88260426eaeb304f3beb88801d68b091a8c4c46a6cac769ff48593d397aaf416b78b5bd72a66785234f2239357ba7edc2e0c4904b59314cf7dba

  • SSDEEP

    98304:nJf9jblCo5yjVkwp3xPsCPCnJE/JT/p9T3cmHEVPxNUYgKV23xPsCPCnJE/JT/pF:J1jbEoisCPWc19dKQPK8sCPWc19

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b40cf3b84766eb09ae4a8f5cbd4d52e.exe
    "C:\Users\Admin\AppData\Local\Temp\3b40cf3b84766eb09ae4a8f5cbd4d52e.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Users\Admin\AppData\Local\Temp\3b40cf3b84766eb09ae4a8f5cbd4d52e.exe
      C:\Users\Admin\AppData\Local\Temp\3b40cf3b84766eb09ae4a8f5cbd4d52e.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2932

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\3b40cf3b84766eb09ae4a8f5cbd4d52e.exe

          Filesize

          384KB

          MD5

          49273b127c49f53279ad53d679f94f02

          SHA1

          31e6af62d04b59bec22bdf6f010f6f2d5e18ff04

          SHA256

          1660b5f7301f660c26f98130ec61b33a97b149bea2a0930c2c79877fd3d373ae

          SHA512

          f6abd2d2ea6dde7b36824620ca386657057e42022fb99d818f5c5f7df0c130a290c2c3b1d895cef839935a77dc72b4977ec98ba42919b26604c792b587166371

        • \Users\Admin\AppData\Local\Temp\3b40cf3b84766eb09ae4a8f5cbd4d52e.exe

          Filesize

          382KB

          MD5

          14c4a50618478aee17865300172ebe15

          SHA1

          7b0f0450d86c93298c45ec33a868a912f89f1900

          SHA256

          d9fb52d585b8eb081c26f1d1a63e2761374ccdb17562082e106099faa1e5639e

          SHA512

          e4520ad54e70413b9861c5744240678392013dc45409888ff1f5a5f4fc9b5237b9134dbf4d606b903138ff0d5491623edb95fab2e6e7188ea467c284f405e2f6

        • memory/2232-1-0x0000000000400000-0x0000000000605000-memory.dmp

          Filesize

          2.0MB

        • memory/2232-3-0x0000000002290000-0x00000000024EA000-memory.dmp

          Filesize

          2.4MB

        • memory/2232-0-0x0000000000400000-0x0000000000D9E000-memory.dmp

          Filesize

          9.6MB

        • memory/2232-15-0x0000000000400000-0x0000000000605000-memory.dmp

          Filesize

          2.0MB

        • memory/2232-16-0x0000000004D90000-0x000000000572E000-memory.dmp

          Filesize

          9.6MB

        • memory/2232-43-0x0000000004D90000-0x000000000572E000-memory.dmp

          Filesize

          9.6MB

        • memory/2932-18-0x0000000000400000-0x0000000000D9E000-memory.dmp

          Filesize

          9.6MB

        • memory/2932-20-0x0000000001FA0000-0x00000000021FA000-memory.dmp

          Filesize

          2.4MB

        • memory/2932-44-0x0000000000400000-0x0000000000D9E000-memory.dmp

          Filesize

          9.6MB