Analysis

  • max time kernel
    139s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 20:49

General

  • Target

    3b049ee8f3cbdd79f17521f1441683a3.exe

  • Size

    133KB

  • MD5

    3b049ee8f3cbdd79f17521f1441683a3

  • SHA1

    78477862f7bf55fc6a1e30a487d0287500f42309

  • SHA256

    ee00ed3887dbe714703d3055805d2e0145f8e21afcf24bd2381cf54c9071c01f

  • SHA512

    2fd9a914e0a9e044f45c68c9693929c320ca55e5b4435578f5da59d5705fa98c1f0d2405cbbd386698c62c2fa662b3902886ebc7aabb1781058b6f62322c27bd

  • SSDEEP

    3072:kAwcdChnBFKj5WuDJVLVGi9YYeKp8Vei9AtEuhj3U/M0xQ:kAw/VBFKjFDTA8YYmc2AtEu13UBQ

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b049ee8f3cbdd79f17521f1441683a3.exe
    "C:\Users\Admin\AppData\Local\Temp\3b049ee8f3cbdd79f17521f1441683a3.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1888
    • C:\Users\Admin\AppData\Local\Temp\3b049ee8f3cbdd79f17521f1441683a3.exe
      C:\Users\Admin\AppData\Local\Temp\3b049ee8f3cbdd79f17521f1441683a3.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2740

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\3b049ee8f3cbdd79f17521f1441683a3.exe

          Filesize

          133KB

          MD5

          1a6930104388a31b657555f3dd393f4b

          SHA1

          fe3708367e16da2fceecc0e4d11376af3aaf1f53

          SHA256

          55949b84a2f91806a74c815551c06e7af944a2afc28974f4b93f727bef57a404

          SHA512

          62c3a0d433fad605452625765ed2a21f7d3177165803607d45cfeaad46546799a51c79c6add3eab443c5a52c5d5305d5deb62a50ed0098cf913f3ec21d032e20

        • memory/1888-0-0x0000000000400000-0x0000000000486000-memory.dmp

          Filesize

          536KB

        • memory/1888-3-0x00000000001F0000-0x0000000000211000-memory.dmp

          Filesize

          132KB

        • memory/1888-1-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/1888-15-0x0000000002CE0000-0x0000000002D66000-memory.dmp

          Filesize

          536KB

        • memory/1888-14-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2740-17-0x0000000000400000-0x0000000000486000-memory.dmp

          Filesize

          536KB

        • memory/2740-18-0x0000000000150000-0x0000000000171000-memory.dmp

          Filesize

          132KB

        • memory/2740-40-0x0000000000400000-0x0000000000486000-memory.dmp

          Filesize

          536KB