Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 14:17

General

  • Target

    39881622df5f1bec029291493efabcb0.exe

  • Size

    65KB

  • MD5

    39881622df5f1bec029291493efabcb0

  • SHA1

    47f95a5c819e9f5964571ac6cc16a2c38a0a5784

  • SHA256

    4caa9655337629343b9b546cd1d96ad98d213972d645d00c7f3d71fb7caf635f

  • SHA512

    474c9b56a3f8bd1fa15da8ea5837ac5d18732c8098468c1f755a17028a76a71721284152be26b2c26102e6da9534890793e7f7ee5282bf5825716791e8a9520b

  • SSDEEP

    1536:h7Lgjr9SUNU1oh2QL1+NjZs9gdHI0p2s42KC7nd7A:hroMTNje9gZ9i2Ku9A

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 2 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies registry class 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\39881622df5f1bec029291493efabcb0.exe
    "C:\Users\Admin\AppData\Local\Temp\39881622df5f1bec029291493efabcb0.exe"
    1⤵
    • Modifies firewall policy service
    • Sets DLL path for service in the registry
    • Sets service image path in registry
    • Loads dropped DLL
    • Modifies registry class
    PID:2968

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\a.dll

          Filesize

          55KB

          MD5

          8e97d532db4b808c0ffc2019b905346e

          SHA1

          87ea0ec6680a8bfd5bd60ad737ef40e217cbc380

          SHA256

          5a46cc390efe1376eb01822017e7ea7b60fbf8c53883357f2bd55a8836d2e618

          SHA512

          cbaf55bc3a1b98b8e1ad555423d1ae9fc2a1b846a3d0e21f7408cae83111faf468b28829a78fc4a1989abdcb953a9d5e7b78ab666b056a353cfc06190b5b249e

        • memory/2968-5-0x0000000030000000-0x0000000030011000-memory.dmp

          Filesize

          68KB

        • memory/2968-6-0x00000000003D0000-0x00000000003EE000-memory.dmp

          Filesize

          120KB

        • memory/2968-9-0x00000000003D0000-0x00000000003EE000-memory.dmp

          Filesize

          120KB

        • memory/2968-10-0x00000000003D0000-0x00000000003EE000-memory.dmp

          Filesize

          120KB

        • memory/2968-11-0x00000000003D0000-0x00000000003EE000-memory.dmp

          Filesize

          120KB

        • memory/2968-17-0x00000000003D0000-0x00000000003EE000-memory.dmp

          Filesize

          120KB

        • memory/2968-12-0x0000000030000000-0x0000000030011000-memory.dmp

          Filesize

          68KB

        • memory/2968-18-0x0000000030000000-0x0000000030011000-memory.dmp

          Filesize

          68KB

        • memory/2968-19-0x0000000030000000-0x0000000030011000-memory.dmp

          Filesize

          68KB