Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 05:05

General

  • Target

    295035f97f883939e55881990d525b40.exe

  • Size

    13KB

  • MD5

    295035f97f883939e55881990d525b40

  • SHA1

    7f365a65170d8b93d43d264be0f2dba7ce2ebb47

  • SHA256

    4b14b62f1fba0c925ae135f2f5f8047104b1dbbf2cb3378759bb0287ad0e0f40

  • SHA512

    f68731390d51b40a3cfa7062df965272e5118ad17305957f83761226c76a0e7915527c3f8413947fdce0dca7ba9687082d47f0299da780d461de5c96726da7ba

  • SSDEEP

    384:1rNakzT8njwB6e1VxP/piFlB30uC8pQXg:5hgnMB6eJIV30ip

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\295035f97f883939e55881990d525b40.exe
    "C:\Users\Admin\AppData\Local\Temp\295035f97f883939e55881990d525b40.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:64
    • C:\Windows\SysWOW64\sunonyk.exe
      C:\Windows\system32\sunonyk.exe ˜‰
      2⤵
      • Executes dropped EXE
      PID:416
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\295035f97f883939e55881990d525b40.exe.bat
      2⤵
        PID:1304

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\295035f97f883939e55881990d525b40.exe.bat

            Filesize

            182B

            MD5

            fec4cd61023b33d73e90807c75fdaeab

            SHA1

            88c5154cb44823807e008817616fddaf3ada34ec

            SHA256

            236ebcc5059633b7cd468f969808f32250e9364aab3ff49fa0383d558346946f

            SHA512

            536aa6224385d8be820ed1e10ea5dd66dec0be09972048404e3150f4c58c3bed81436f553e0db1993021281c5e05871ddf0f84c8774949504258b37fd1299e46

          • C:\Windows\SysWOW64\sunonyk.exe

            Filesize

            13KB

            MD5

            295035f97f883939e55881990d525b40

            SHA1

            7f365a65170d8b93d43d264be0f2dba7ce2ebb47

            SHA256

            4b14b62f1fba0c925ae135f2f5f8047104b1dbbf2cb3378759bb0287ad0e0f40

            SHA512

            f68731390d51b40a3cfa7062df965272e5118ad17305957f83761226c76a0e7915527c3f8413947fdce0dca7ba9687082d47f0299da780d461de5c96726da7ba

          • memory/64-0-0x0000000000400000-0x000000000040E000-memory.dmp

            Filesize

            56KB

          • memory/64-6-0x0000000000400000-0x000000000040E000-memory.dmp

            Filesize

            56KB

          • memory/416-7-0x0000000000400000-0x000000000040E000-memory.dmp

            Filesize

            56KB