Analysis

  • max time kernel
    122s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 07:23

General

  • Target

    2d3ae51275a8631d9099fe7c216cad4f.exe

  • Size

    25KB

  • MD5

    2d3ae51275a8631d9099fe7c216cad4f

  • SHA1

    e61df6c2c001f54b56ff8b12bed03234e40d2659

  • SHA256

    59cf569fd6151c044f06051c3021b5bc830cf5449c76b118b5e9bf3f4988ee86

  • SHA512

    c426e5a280e05e6285a8120be87658df14e71ae845b0702cf8109e4249d61eb88360c68976f4624d18d5699a6f04b474673afff288b91b6fae9b71a770ecc340

  • SSDEEP

    384:M+g+Zmk+fIjXJ2lW0JDFB5kiC+nyZ9sGCHC5Iwz9HRMEihm1Ucqk3U:MK8k+wDJZ0J79nyZQi5Iwz9HRMEiho3U

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d3ae51275a8631d9099fe7c216cad4f.exe
    "C:\Users\Admin\AppData\Local\Temp\2d3ae51275a8631d9099fe7c216cad4f.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2300
    • C:\Users\Admin\AppData\Local\Temp\decrypted.exe
      "C:\Users\Admin\AppData\Local\Temp\decrypted.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2408
  • C:\Windows\SysWOW64\cmd.exe
    cmd /c ""C:\Users\Admin\AppData\Local\Temp\67F7.tmp\3.bat""
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2300-0-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2300-12-0x0000000000520000-0x000000000052F000-memory.dmp

    Filesize

    60KB

  • memory/2300-13-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2300-35-0x0000000000520000-0x000000000052F000-memory.dmp

    Filesize

    60KB

  • memory/2408-14-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2408-34-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB