Analysis

  • max time kernel
    118s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 02:57

General

  • Target

    2568f2d8195e4307e2817c27d243cf8e.exe

  • Size

    133KB

  • MD5

    2568f2d8195e4307e2817c27d243cf8e

  • SHA1

    457f6942b081ec5d96d8ed7ec9815ed4dbc1027e

  • SHA256

    3776de96f4af4ead9a3a46d49ce409fad200c97c57a8ca13e9f892f6b3507796

  • SHA512

    4a5fccf6e734d7d7d0ba5a3e69b5c57b221f91868977fbef1af497ba778b94ef8c2f23d3ad967969c9be0110cfe38b5bdf58f9654729508b91f7d0303a6a3548

  • SSDEEP

    3072:3Wmye465cBDMZSRLkzsb0TK2FEwP/4cpPpzjoLGHoYCLQ:3Jye46S1+0MsaEq4Oo2+Q

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2568f2d8195e4307e2817c27d243cf8e.exe
    "C:\Users\Admin\AppData\Local\Temp\2568f2d8195e4307e2817c27d243cf8e.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2512
    • C:\Users\Admin\AppData\Local\Temp\2568f2d8195e4307e2817c27d243cf8e.exe
      C:\Users\Admin\AppData\Local\Temp\2568f2d8195e4307e2817c27d243cf8e.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\2568f2d8195e4307e2817c27d243cf8e.exe

    Filesize

    133KB

    MD5

    6a9088e56e4428815eb11abf9a147af8

    SHA1

    25949a5a72942906af6d1d75fe4b2355765480d4

    SHA256

    4afb1e9b7dfd34bf688f58f7d50e86575d46c392f8f4543ac6b76886bf5e1607

    SHA512

    00de8531aabbe2c4f2b14553baf5bc4fe10bea99ccdd5cf01383e68ffabfb42f0545bb502b99bc1c4b93fbbb84de35bc133bac8c1f9ba66a1ccfa530140fe03d

  • memory/2512-0-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2512-1-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2512-2-0x0000000000150000-0x0000000000171000-memory.dmp

    Filesize

    132KB

  • memory/2512-14-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2532-16-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2532-18-0x0000000000150000-0x0000000000171000-memory.dmp

    Filesize

    132KB

  • memory/2532-41-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB