Analysis

  • max time kernel
    118s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01/01/2024, 20:43

General

  • Target

    3dd6809cbb9fc64db257000dc181e1e3.exe

  • Size

    2.6MB

  • MD5

    3dd6809cbb9fc64db257000dc181e1e3

  • SHA1

    b309b8f1518158ad6b9290556510cd4a4033343a

  • SHA256

    8823820830114ed87eb0a489a34c8dc148878d4dbf5805c0229ff830ea8ced01

  • SHA512

    5f12938df43669ee37184a50b10f13ea6637758fc80ca17a160a44800399ae6061976d02775bd6b2c6f5d9b12f5dd87186036d2f0d05155040bf858487c38e8b

  • SSDEEP

    49152:DB7RnJPsmxp+uHo7ac8PYOTwLfQ3p1Xhydh18hTJlgumA38ETXfdamay3:DBjPoV8PUEHqOTJjz3

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3dd6809cbb9fc64db257000dc181e1e3.exe
    "C:\Users\Admin\AppData\Local\Temp\3dd6809cbb9fc64db257000dc181e1e3.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:928
    • C:\Users\Admin\AppData\Local\Temp\3dd6809cbb9fc64db257000dc181e1e3.exe
      C:\Users\Admin\AppData\Local\Temp\3dd6809cbb9fc64db257000dc181e1e3.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:3056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3dd6809cbb9fc64db257000dc181e1e3.exe

    Filesize

    1.2MB

    MD5

    2e2a115a9a74427fd2b3235e01a23f14

    SHA1

    30c7cedc9fe3f5952b79b5d96834a159e8a7c2a4

    SHA256

    f9a263e4938e1d2e3f2acea3d95ad816e9d881ffb378c187fcc7077a3d4a4175

    SHA512

    75cc13c58147365b0e80650dc30dbe531a0da4e7c1d4a18b853abbae6d2048b1c3f085588701a7fe30076ca60961600fce7aa7fed7e721494aeca5d9ebefffc4

  • C:\Users\Admin\AppData\Local\Temp\3dd6809cbb9fc64db257000dc181e1e3.exe

    Filesize

    1.5MB

    MD5

    1c4e4ba7dd77dc4cb375f705c12f3ddf

    SHA1

    9b99d40bbec879328a1219b3812b0cbbcc1a9620

    SHA256

    5575ec2292b4cf5a5b8d633d593f275c3e45fede96502112db3070bbfddc5698

    SHA512

    1dc9cede5c499b1f0171a1bc9488b57809db34ab18150bcdaaf1454993986ed4bc27aa04cdcf0740576dfba232461f393f497e2936dd8ce96a103893d3345b08

  • \Users\Admin\AppData\Local\Temp\3dd6809cbb9fc64db257000dc181e1e3.exe

    Filesize

    832KB

    MD5

    0bfd0d8feceec1980d4ce2d36de201bb

    SHA1

    a2cf8589451f3199f2954f0ef8e259d45474e019

    SHA256

    066b8548836dc9a25a40508453997cd3bacb42f14ec49a339766c34152d178a4

    SHA512

    8dfb3000cd1937bc87c23ab7240118a3f01c62fbb97795045143246a00b66d32a114968e27f32a7e2c7ce4fcbeddd2c083307214ac9139dca90e844739a46c48

  • memory/928-0-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/928-2-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/928-4-0x0000000001FA0000-0x00000000021FA000-memory.dmp

    Filesize

    2.4MB

  • memory/928-15-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/3056-17-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/3056-19-0x0000000001FA0000-0x00000000021FA000-memory.dmp

    Filesize

    2.4MB

  • memory/3056-41-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB