Analysis

  • max time kernel
    194s
  • max time network
    214s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 02:01

General

  • Target

    23b5fc6c6627e0275d8f58d6fa1c84d7.exe

  • Size

    133KB

  • MD5

    23b5fc6c6627e0275d8f58d6fa1c84d7

  • SHA1

    d61432dba2d0f21bd4a4eea0f86c82aa67b49e85

  • SHA256

    8b46ca05056ba3c265ede89ba545d5ada611102d9f73871f9b8e61ff72e64288

  • SHA512

    df4be988b5396b2a3d2d368e1ccce5d4bad5ce7848b58da5d7395565b4ab763b840a71a7542ab387870d940267cf30c263a84f6b179e230c680f84a494a66f8b

  • SSDEEP

    3072:GdamYB0bjPpIITFwfZZ/dqYepH+9o+fP4pEGEzlQ:G+OjBIITwZ/PepH+9o3pUzlQ

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\23b5fc6c6627e0275d8f58d6fa1c84d7.exe
    "C:\Users\Admin\AppData\Local\Temp\23b5fc6c6627e0275d8f58d6fa1c84d7.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3236
    • C:\Users\Admin\AppData\Local\Temp\23b5fc6c6627e0275d8f58d6fa1c84d7.exe
      C:\Users\Admin\AppData\Local\Temp\23b5fc6c6627e0275d8f58d6fa1c84d7.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:1324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\23b5fc6c6627e0275d8f58d6fa1c84d7.exe

    Filesize

    133KB

    MD5

    ff022f50aedebe3540f9cf9a0606c4c0

    SHA1

    24a1a303c0df437e6c275ccc1edf0168dc38583a

    SHA256

    4b811c15396d6d4bbb1af6693d991998374af9b7aa31c191bf9a27707baf0079

    SHA512

    452c020d3aa06c0eaacc9caf1e29419aa296818deb54d8c2bde706eed16f1b4c3153d37916187eaea69e52cbe82fe36dd5b1e8df476140ac77f63c7d0ac295ff

  • memory/1324-13-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/1324-16-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1324-15-0x00000000001A0000-0x00000000001C1000-memory.dmp

    Filesize

    132KB

  • memory/1324-22-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/3236-0-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/3236-1-0x00000000000F0000-0x0000000000111000-memory.dmp

    Filesize

    132KB

  • memory/3236-2-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3236-14-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB