Analysis

  • max time kernel
    143s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2023 06:02

General

  • Target

    2b07db24189f167b83bce1947a26dec4.exe

  • Size

    2.9MB

  • MD5

    2b07db24189f167b83bce1947a26dec4

  • SHA1

    2b94a152833181dba181ceca909f80536153de94

  • SHA256

    aec225a6994f17d9cdc65b66728f7c223bf6505ef2ed74242a63b47c4f5ceacf

  • SHA512

    ca76c30744df8c209b8c487226598c82e717fdd040ef10514503ef20d1380ed6e12c6716d7387f8ff515d296c711f5f440ac7bb635b0df42a9126a439d437656

  • SSDEEP

    49152:NgDK7pgHMWUGXtiZ+nepXwJizKVjiwQpvPIUswOG+ZcOIwqI2C1J/7Gy:6G7pXpEiZ/AJiu1iwQpHIUstG+ZcEH1j

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2b07db24189f167b83bce1947a26dec4.exe
    "C:\Users\Admin\AppData\Local\Temp\2b07db24189f167b83bce1947a26dec4.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:668
    • C:\Users\Admin\AppData\Local\Temp\2b07db24189f167b83bce1947a26dec4.exe
      C:\Users\Admin\AppData\Local\Temp\2b07db24189f167b83bce1947a26dec4.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:3776

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/668-1-0x00000000018F0000-0x0000000001A23000-memory.dmp

    Filesize

    1.2MB

  • memory/668-2-0x0000000000400000-0x000000000062A000-memory.dmp

    Filesize

    2.2MB

  • memory/668-0-0x0000000000400000-0x00000000008EF000-memory.dmp

    Filesize

    4.9MB

  • memory/668-13-0x0000000000400000-0x000000000062A000-memory.dmp

    Filesize

    2.2MB

  • memory/3776-14-0x0000000001CA0000-0x0000000001DD3000-memory.dmp

    Filesize

    1.2MB

  • memory/3776-15-0x0000000000400000-0x000000000062A000-memory.dmp

    Filesize

    2.2MB

  • memory/3776-20-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/3776-21-0x00000000055A0000-0x00000000057CA000-memory.dmp

    Filesize

    2.2MB

  • memory/3776-12-0x0000000000400000-0x00000000008EF000-memory.dmp

    Filesize

    4.9MB

  • memory/3776-28-0x0000000000400000-0x00000000008EF000-memory.dmp

    Filesize

    4.9MB