Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 00:11

General

  • Target

    2137629bda3978ed5fd4f90b41e6d956.exe

  • Size

    1.2MB

  • MD5

    2137629bda3978ed5fd4f90b41e6d956

  • SHA1

    12dc7e055d80a3f361979cc1d6e0703d67fa9a49

  • SHA256

    b0062b0772739d7089bbbca7a0055c4f8d02dca810409c9ceab55a51b0cb88d8

  • SHA512

    9899c64d1e15a57cf78588b73ed587710b7e38676fa7606a138d36c8ea07ae373c1a3919ab751a589e0032676ccb86aaac8727f01c27c1f71de9f0d71919a45a

  • SSDEEP

    24576:1VtAkQCjdQ5+uav4NVaeWiUGQCjdQ5+uav4NVa:9AkQeC5+dsVaeJvQeC5+dsVa

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2137629bda3978ed5fd4f90b41e6d956.exe
    "C:\Users\Admin\AppData\Local\Temp\2137629bda3978ed5fd4f90b41e6d956.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2444
    • C:\Users\Admin\AppData\Local\Temp\2137629bda3978ed5fd4f90b41e6d956.exe
      C:\Users\Admin\AppData\Local\Temp\2137629bda3978ed5fd4f90b41e6d956.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\2137629bda3978ed5fd4f90b41e6d956.exe

    Filesize

    384KB

    MD5

    02999a21e7588857aeae5e5610d9d345

    SHA1

    9d9054897fedb2c1755e52db67bae765a1f1449d

    SHA256

    9b5faacd923a8e6033699c95ba06ee6a12d093754283737f80f15dffe3e89aae

    SHA512

    7cc31ae3bbd9374dfd5798db5aa915263699e72c02ec2db9e59b756ae7c6037673566fd9392e8bb575a9981c251c4c21966145d6fdc5972b49f8e55475066b00

  • \Users\Admin\AppData\Local\Temp\2137629bda3978ed5fd4f90b41e6d956.exe

    Filesize

    832KB

    MD5

    68028f62aae8bcde54a5aa0d087a434d

    SHA1

    6affe4978a6213413d5f63031da3a9935c7f7f3b

    SHA256

    e36e4bd5eb7c6bbcc12778f306125aa07dd2f8cacc17576a835953aab56078c6

    SHA512

    40f795556b74accec00b1c3db609c56a6a6ae2849088efa81a5ef42ff3162d66831325aac32645978c092902081579303f3babd3875e666d2f9504cc283e2564

  • memory/2444-0-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/2444-1-0x0000000000160000-0x0000000000191000-memory.dmp

    Filesize

    196KB

  • memory/2444-2-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2444-16-0x00000000001B0000-0x0000000000290000-memory.dmp

    Filesize

    896KB

  • memory/2444-15-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2660-19-0x0000000000160000-0x0000000000191000-memory.dmp

    Filesize

    196KB

  • memory/2660-18-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/2660-43-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB