Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 12:38

General

  • Target

    36709d65ab9d2d36260b5d20695c5592.exe

  • Size

    5.5MB

  • MD5

    36709d65ab9d2d36260b5d20695c5592

  • SHA1

    2d4a258bd3a8363e4268a32abd96f566b0d48158

  • SHA256

    f51a3162a0ddc7e6d76894c3de2d3a36ae457ade22347b003ba59c481bf636ec

  • SHA512

    f15de60f9b241ad48d4494e039fbca6c3b2540f8df94b083582a3600e1ae2531b69a6c62f652cbfab19bfa57d5069610203e819f8b6dd3f4b7ba018e25668528

  • SSDEEP

    49152:LdS8N9zdxaoCGKMbzvOzPpKnh2Vo9AWvqLxeqay3vRmCFOGNj8mW4JH53R+wVG+I:L/V/fOjohqcPvO35mCckFR+vicS43

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36709d65ab9d2d36260b5d20695c5592.exe
    "C:\Users\Admin\AppData\Local\Temp\36709d65ab9d2d36260b5d20695c5592.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:220
    • C:\Users\Admin\AppData\Local\Temp\36709d65ab9d2d36260b5d20695c5592.exe
      C:\Users\Admin\AppData\Local\Temp\36709d65ab9d2d36260b5d20695c5592.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2200

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\36709d65ab9d2d36260b5d20695c5592.exe

    Filesize

    382KB

    MD5

    c418b508874237d1ce984368061e5a75

    SHA1

    b0f8436cc8613002fe1f252d72e83adee8b41e29

    SHA256

    90286b0a65ed9a82ac636c0b2a956f6689b671bde9edd765d260669ed0723d54

    SHA512

    0d3c74a26724df7a81560327457a4e472760aee04060b8f29f4bc5c3fcce4ac0820d48470e39629780f5438b0c342138521b736f6c410daccce8b451b5e4639e

  • memory/220-1-0x00000000023D0000-0x000000000262A000-memory.dmp

    Filesize

    2.4MB

  • memory/220-0-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/220-2-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/220-13-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/2200-15-0x00000000021C0000-0x000000000241A000-memory.dmp

    Filesize

    2.4MB

  • memory/2200-17-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2200-30-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB