Analysis

  • max time kernel
    119s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 12:38

General

  • Target

    36709d65ab9d2d36260b5d20695c5592.exe

  • Size

    5.5MB

  • MD5

    36709d65ab9d2d36260b5d20695c5592

  • SHA1

    2d4a258bd3a8363e4268a32abd96f566b0d48158

  • SHA256

    f51a3162a0ddc7e6d76894c3de2d3a36ae457ade22347b003ba59c481bf636ec

  • SHA512

    f15de60f9b241ad48d4494e039fbca6c3b2540f8df94b083582a3600e1ae2531b69a6c62f652cbfab19bfa57d5069610203e819f8b6dd3f4b7ba018e25668528

  • SSDEEP

    49152:LdS8N9zdxaoCGKMbzvOzPpKnh2Vo9AWvqLxeqay3vRmCFOGNj8mW4JH53R+wVG+I:L/V/fOjohqcPvO35mCckFR+vicS43

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36709d65ab9d2d36260b5d20695c5592.exe
    "C:\Users\Admin\AppData\Local\Temp\36709d65ab9d2d36260b5d20695c5592.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2512
    • C:\Users\Admin\AppData\Local\Temp\36709d65ab9d2d36260b5d20695c5592.exe
      C:\Users\Admin\AppData\Local\Temp\36709d65ab9d2d36260b5d20695c5592.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:1732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\36709d65ab9d2d36260b5d20695c5592.exe

    Filesize

    1.1MB

    MD5

    d299782902e9dadbe7a276034d12f2ff

    SHA1

    10bf26dd1e1343be6f36603fe4fba1b562911e3c

    SHA256

    6e9e4453d554206facd789c1bb4d1fa9e4a81fa1053a0fa55092d9e832bb4ddb

    SHA512

    4548197f7a333a2d5017d1b0373afd7c02b7a4ce7dd80c64c5fea6da7cb84b918ce85ea3fe25cb0024c578e4bfc0cd7f69e93a328de704ba7ca2df3638674b96

  • \Users\Admin\AppData\Local\Temp\36709d65ab9d2d36260b5d20695c5592.exe

    Filesize

    1.5MB

    MD5

    8c849311ec82fe5661de9d805308f63b

    SHA1

    2b9003e7564cf44d07dc92953faa8c6cfaf11595

    SHA256

    6ecab6e93e4b8022c895f85212186f3e30291e25c97990ceaef224e9564e8ae0

    SHA512

    40cca7ab14aacc55f5f9f660f087596b687de140e656fdeca7468c23db515ea84e6311645b4776de68d8f613cbdae5d50c4f4062c1830178c62c0664d3ed1527

  • memory/1732-18-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/1732-20-0x0000000001FA0000-0x00000000021FA000-memory.dmp

    Filesize

    2.4MB

  • memory/1732-44-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2512-1-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2512-0-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/2512-4-0x0000000001FA0000-0x00000000021FA000-memory.dmp

    Filesize

    2.4MB

  • memory/2512-16-0x0000000004140000-0x0000000004ADE000-memory.dmp

    Filesize

    9.6MB

  • memory/2512-14-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/2512-43-0x0000000004140000-0x0000000004ADE000-memory.dmp

    Filesize

    9.6MB