Analysis

  • max time kernel
    15s
  • max time network
    90s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 07:30

General

  • Target

    2d7368a01282d78e9b5ed807bffca74e.exe

  • Size

    11.0MB

  • MD5

    2d7368a01282d78e9b5ed807bffca74e

  • SHA1

    75f5f22ef03a534d1adca1e0ab0f96b79d68bd9e

  • SHA256

    5ef1f7e0be32b925f7d24a6ff0478fa10db79efbf7fccbf3ca1b2a44f0aef564

  • SHA512

    5d062afdf52799128c22bdc47a16a29ddab814483b1b4310f3cd5de885ad5f3b1ba53398bb0f16f219165fdc52b3b3d61fc82a0d2a70ac8c8644301f7823adef

  • SSDEEP

    196608:0KMh+GLLd0n33FR+6cFPwUmd333FR+6c:eZ6f+RFPU+R

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d7368a01282d78e9b5ed807bffca74e.exe
    "C:\Users\Admin\AppData\Local\Temp\2d7368a01282d78e9b5ed807bffca74e.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4476
    • C:\Users\Admin\AppData\Local\Temp\2d7368a01282d78e9b5ed807bffca74e.exe
      C:\Users\Admin\AppData\Local\Temp\2d7368a01282d78e9b5ed807bffca74e.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:1020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\2d7368a01282d78e9b5ed807bffca74e.exe

    Filesize

    12KB

    MD5

    104db180ebd8d8941c9596d9c030baf6

    SHA1

    900f23ec83f7daf2355ca8aab948a658809aa466

    SHA256

    c32966803fca33a92d72753a2873e676a33d4f37eb957251f9c1124e61ce363b

    SHA512

    6defbf7172d274b4af384e9761cff0adbff2c315c0908fd694a220a246e6b1de0743213d9186b4287dffe37821bbaaa81f7009672b43c2a0f4cc96fad2bbdb07

  • memory/1020-14-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/1020-16-0x0000000002190000-0x00000000023EA000-memory.dmp

    Filesize

    2.4MB

  • memory/1020-30-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/4476-0-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/4476-1-0x00000000020B0000-0x000000000230A000-memory.dmp

    Filesize

    2.4MB

  • memory/4476-2-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/4476-13-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB