Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 14:27

General

  • Target

    39cfc469508d5965215416846991499a.exe

  • Size

    395KB

  • MD5

    39cfc469508d5965215416846991499a

  • SHA1

    4cc5af5cd531d2f05d1512f95140e4f98da9ac77

  • SHA256

    34a16978931e47e4f89d3815a48c732473778e75a06aa1cae7f8e5dddea6e93a

  • SHA512

    6c81302d2764a9bdcb9d35f1d64835f09b40dc7d2606aebfb7cd505754b4bfeed90fdda85f29ca5e6b014815fc517305777dca3ce5837bb068ed5f2aeb2bb7f8

  • SSDEEP

    6144:/MWl87c3NnVA6DUXV6S/kL4QzVSzvY8TKWxbVKcArEuer7:f35vUXV0c6WQkK5Xver7

Score
8/10
upx

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\SysWOW64\drivers\suchost.exe
    C:\Windows\system32\drivers\suchost.exe
    1⤵
    • Executes dropped EXE
    • Suspicious behavior: EnumeratesProcesses
    PID:940
  • C:\Windows\SysWOW64\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\8$$.bat
    1⤵
    • Deletes itself
    PID:2384
  • C:\Users\Admin\AppData\Local\Temp\39cfc469508d5965215416846991499a.exe
    "C:\Users\Admin\AppData\Local\Temp\39cfc469508d5965215416846991499a.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1884

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/940-20-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/1884-18-0x00000000005E0000-0x000000000062A000-memory.dmp

    Filesize

    296KB

  • memory/1884-21-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/1884-0-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB