Analysis

  • max time kernel
    122s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 02:02

General

  • Target

    23c267ec46f9662bac668eb9a3e00457.exe

  • Size

    266KB

  • MD5

    23c267ec46f9662bac668eb9a3e00457

  • SHA1

    60f6025ec2e97c783aa4dc0299e89b4adb255c8e

  • SHA256

    ee06d821d28bccca098a971bc7450e93969babca22123c413d0c696af36bb31d

  • SHA512

    247c3ac5b075293fe43e27f1aca8c64a107c15d9793d549b496054d777ad02e0ad95d89a800ccb2f05f10c7c9bb49ea094f7f7d1ecee6ff5704abf8b3e7530ed

  • SSDEEP

    6144:A/d1l7zLChuALbPgesVnmvUmWdE24A+MX2tVVamEaQ:A/d1lTJgsmOi24A+tVFEP

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\23c267ec46f9662bac668eb9a3e00457.exe
    "C:\Users\Admin\AppData\Local\Temp\23c267ec46f9662bac668eb9a3e00457.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2164
    • C:\Users\Admin\AppData\Local\Temp\23c267ec46f9662bac668eb9a3e00457.exe
      C:\Users\Admin\AppData\Local\Temp\23c267ec46f9662bac668eb9a3e00457.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\23c267ec46f9662bac668eb9a3e00457.exe

    Filesize

    266KB

    MD5

    44d1b59562aed431ba1c9e83b262c99f

    SHA1

    9c840fe16a092e3d7f18dbc7597b111127606dd0

    SHA256

    619a156ed635103a0b53698b812e063cb21e08525144c910b7e44972f0f077de

    SHA512

    ca53f34ff987d2676adf2ead89b7b2584711ffacf5e5959f07f1704780ab02d8ef1e90a9586ca8352bf34201ad50df83af6368c4e4a90b3f85774f630160ad73

  • memory/2164-0-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2164-2-0x0000000000150000-0x0000000000171000-memory.dmp

    Filesize

    132KB

  • memory/2164-1-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2164-15-0x0000000001490000-0x0000000001516000-memory.dmp

    Filesize

    536KB

  • memory/2164-14-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2164-42-0x0000000001490000-0x0000000001516000-memory.dmp

    Filesize

    536KB

  • memory/2652-19-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2652-21-0x00000000002F0000-0x0000000000311000-memory.dmp

    Filesize

    132KB

  • memory/2652-43-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB