Analysis

  • max time kernel
    136s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 01:12

General

  • Target

    229c03ae34f9a813765d8b5e8257194e.exe

  • Size

    133KB

  • MD5

    229c03ae34f9a813765d8b5e8257194e

  • SHA1

    2ecd63cd51814a452f9e351675828a0f9507adb1

  • SHA256

    d7eb4036280d0008eab633db974c1d3e3ba48243e31998ec54339baf32bf5162

  • SHA512

    fb686a6bb8a47a07e3b47e618f23787c969255832d7aec83323ad6b2101dcea67643b51fef0a9eeec8d82109e57468608900d3335cceeaf14b1d5bf4f0b3b4b1

  • SSDEEP

    3072:kw8ghinRK11KgYm/bsJPx9yg0BpkE3R/Q:kweRpgYmIJ3GSERQ

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\229c03ae34f9a813765d8b5e8257194e.exe
    "C:\Users\Admin\AppData\Local\Temp\229c03ae34f9a813765d8b5e8257194e.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Users\Admin\AppData\Local\Temp\229c03ae34f9a813765d8b5e8257194e.exe
      C:\Users\Admin\AppData\Local\Temp\229c03ae34f9a813765d8b5e8257194e.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:3012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\229c03ae34f9a813765d8b5e8257194e.exe

    Filesize

    133KB

    MD5

    073e367ec0fadf7429c640408014a2a0

    SHA1

    048590d50b50eb032e4b460a3d1cb64713276108

    SHA256

    ec766d05b3b3b288c57db139c3e69a08a597f545a75226e09144c5eac43dd90c

    SHA512

    1f17b0a29b71d1f08c7e800e5d9a3ef37c8af13b93cfc8de2bca85445d8c11ff1c6d3dee7f8c268af3e9779605e0cf785dde3757f8a170065a6fc4bad52d4541

  • memory/2888-0-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2888-1-0x00000000001D0000-0x00000000001F1000-memory.dmp

    Filesize

    132KB

  • memory/2888-2-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2888-16-0x0000000000320000-0x00000000003A6000-memory.dmp

    Filesize

    536KB

  • memory/2888-15-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3012-18-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/3012-20-0x0000000000150000-0x0000000000171000-memory.dmp

    Filesize

    132KB

  • memory/3012-34-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB