Analysis

  • max time kernel
    119s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2023 02:24

General

  • Target

    Project Storgma/Dependencies/Storgma.exe

  • Size

    76.8MB

  • MD5

    a84ade8ce9bbbfdb092cbc36ed06fe08

  • SHA1

    47928c197004205ec5d694a197e801fba2423df5

  • SHA256

    c35f8c769a8fdfef87b898fc0aaf62b6871e7f53799b50d9f74211dc37f20743

  • SHA512

    f9a6c5f7592f1cf8e1e0a1ca12c6da744a261f6c9ca5842361060a8574a7a27cb12d5e96f6ad8607a885ffd02797209f010fa1c2e3e65ee7b193d95e79badadd

  • SSDEEP

    1572864:TBoGiJGIQYHc5ndSk8IpG7V+VPhqC3BE7uHpXnnYWfsnghowmaOllMkWtUWI2mBb:TBoGexUdSkB05awC3zJX3mghfxOllMkt

Score
7/10
upx

Malware Config

Signatures

  • Loads dropped DLL 7 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Project Storgma\Dependencies\Storgma.exe
    "C:\Users\Admin\AppData\Local\Temp\Project Storgma\Dependencies\Storgma.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2684
    • C:\Users\Admin\AppData\Local\Temp\Project Storgma\Dependencies\Storgma.exe
      "C:\Users\Admin\AppData\Local\Temp\Project Storgma\Dependencies\Storgma.exe"
      2⤵
      • Loads dropped DLL
      PID:3056

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI26842\api-ms-win-core-file-l1-2-0.dll

    Filesize

    12KB

    MD5

    49e3260ae3f973608f4d4701eb97eb95

    SHA1

    097e7d56c3514a3c7dc17a9c54a8782c6d6c0a27

    SHA256

    476fbad616e20312efc943927ade1a830438a6bebb1dd1f83d2370e5343ea7af

    SHA512

    df22cf16490faa0dc809129ca32eaf1a16ec665f9c5411503ce0153270de038e5d3be1e0e49879a67043a688f6c42bdb5a9a6b3cea43bf533eba087e999be653

  • C:\Users\Admin\AppData\Local\Temp\_MEI26842\api-ms-win-core-file-l2-1-0.dll

    Filesize

    12KB

    MD5

    7f14fd0436c066a8b40e66386ceb55d0

    SHA1

    288c020fb12a4d8c65ed22a364b5eb8f4126a958

    SHA256

    c78eab8e057bddd55f998e72d8fdf5b53d9e9c8f67c8b404258e198eb2cdcf24

    SHA512

    d04adc52ee0ceed4131eb1d133bfe9a66cbc0f88900270b596116064480afe6ae6ca42feb0eaed54cb141987f2d7716bb2dae947a025014d05d7aa0b0821dc50

  • C:\Users\Admin\AppData\Local\Temp\_MEI26842\api-ms-win-core-localization-l1-2-0.dll

    Filesize

    15KB

    MD5

    71457fd15de9e0b3ad83b4656cad2870

    SHA1

    c9c2caf4f9e87d32a93a52508561b4595617f09f

    SHA256

    db970725b36cc78ef2e756ff4b42db7b5b771bfd9d106486322cf037115bd911

    SHA512

    a10fcf1d7637effff0ae3e3b4291d54cc7444d985491e82b3f4e559fbb0dbb3b6231a8c689ff240a5036a7acae47421cda58aaa6938374d4b84893cce0077bc8

  • C:\Users\Admin\AppData\Local\Temp\_MEI26842\api-ms-win-core-processthreads-l1-1-1.dll

    Filesize

    13KB

    MD5

    e93816c04327730d41224e7a1ba6dc51

    SHA1

    3f83b9fc6291146e58afce5b5447cd6d2f32f749

    SHA256

    ca06ccf12927ca52d8827b3a36b23b6389c4c6d4706345e2d70b895b79ff2ec8

    SHA512

    beaab5a12bfc4498cdf67d8b560ef0b0e2451c5f4634b6c5780a857666fd14f8a379f42e38be1beefa1c3578b2df913d901b271719ac6794bfaab0731bb77bca

  • C:\Users\Admin\AppData\Local\Temp\_MEI26842\python311.dll

    Filesize

    716KB

    MD5

    c6c03ca5dc027eea42ba22ca694dbdf9

    SHA1

    4167dde55b43f94fffe3f13174196099a5a75263

    SHA256

    383b99209467601109a6e34b4a598683c72c116e12ced07b53d9c04d18d2d49e

    SHA512

    d705466ad0d285daabc47a912019a4de299fa266ab9217f9374b126d901e699110ee94855b8acdfe3185d1d47e06bbae11febc344dfb77d90a188fcbf517e4d5

  • C:\Users\Admin\AppData\Local\Temp\_MEI26842\ucrtbase.dll

    Filesize

    594KB

    MD5

    a20650fb16c4e879590cc13e068c32cc

    SHA1

    e3d1151ba584ec2e94e4ea954fea2a6ef11ccbec

    SHA256

    10c928834c947005b889474fd3c7ecc894c78e926cf1c9c27e800c242724f824

    SHA512

    fd4af95f0943d71ac3bdd7c16d8775eaf03172878fd1b7e95114091007339df75877a5140ba0a65353d03a06757dfc1528f12ccae20360ad2b7ee0ff477841b5

  • \Users\Admin\AppData\Local\Temp\_MEI26842\api-ms-win-core-timezone-l1-1-0.dll

    Filesize

    13KB

    MD5

    acf40d5e6799231cf7e4026bad0c50a0

    SHA1

    8f0395b7e7d2aac02130f47b23b50d1eab87466b

    SHA256

    64b5b95fe56b6df4c2d47d771bec32bd89267605df736e08c1249b802d6d48d1

    SHA512

    f66a61e89231b6dc95b26d97f5647da42400bc809f70789b9afc00a42b94ea3487913860b69a1b0ee59ed5eb62c3a0cade9e21f95da35fdd42d8ce51c5507632

  • \Users\Admin\AppData\Local\Temp\_MEI26842\python311.dll

    Filesize

    152KB

    MD5

    8da2317ec57313860bc2f087fad33769

    SHA1

    05f873be87620f8c8035b802a8a33377743ede59

    SHA256

    0c88b3581f6b48bb8c54247f7f5aeea0b1d8c6e02edb26f19ca1b27aa9681f5e

    SHA512

    9c44048e0a5adc0c124af99e8f343c2724278337c4a17a98d019fb1e8d9d53cb4891e7c470c5eef2828f6f5cfd54396ecd1f8ec46f7eaf69a4cfc5735820a5b4

  • \Users\Admin\AppData\Local\Temp\_MEI26842\ucrtbase.dll

    Filesize

    994KB

    MD5

    8e7680a8d07c3c4159241d31caaf369c

    SHA1

    62fe2d4ae788ee3d19e041d81696555a6262f575

    SHA256

    36cc22d92a60e57dee394f56a9d1ed1655ee9db89d2244a959005116a4184d80

    SHA512

    9509f5b07588a08a490f4c3cb859bbfe670052c1c83f92b9c3356afa664cb500364e09f9dafac7d387332cc52d9bb7bb84ceb1493f72d4d17ef08b9ee3cb4174

  • memory/3056-1301-0x000007FEF58D0000-0x000007FEF5EBA000-memory.dmp

    Filesize

    5.9MB