Analysis

  • max time kernel
    166s
  • max time network
    187s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04/01/2024, 09:16

General

  • Target

    4077d26bc2a2f9dede31db14cef08487.exe

  • Size

    133KB

  • MD5

    4077d26bc2a2f9dede31db14cef08487

  • SHA1

    028bc2055c4cff39d0f80efa4da02472619aa423

  • SHA256

    0c5d692deb143a89248cf4ecb29bcfa32df15f1e772b25b8e6192c1e42922915

  • SHA512

    2048998349845f107140771e68976edacc09888baa4a3354ca81afee57f01b81ba919520df7c75f3b17e5533ea4138ed00ee45bf27090f6ebb3b3a87fee8fe19

  • SSDEEP

    3072:w6YG61+kCdt/4yX7TNuMZLp7HuGU9Lab8E+aNKApshQ:w6C1+Uyr0+LqLabiApshQ

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4077d26bc2a2f9dede31db14cef08487.exe
    "C:\Users\Admin\AppData\Local\Temp\4077d26bc2a2f9dede31db14cef08487.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2848
    • C:\Users\Admin\AppData\Local\Temp\4077d26bc2a2f9dede31db14cef08487.exe
      C:\Users\Admin\AppData\Local\Temp\4077d26bc2a2f9dede31db14cef08487.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:1948

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\4077d26bc2a2f9dede31db14cef08487.exe

          Filesize

          133KB

          MD5

          8c177cd0b438cfb3878f8e193009425b

          SHA1

          d12ca161b954c0569de55907d587eee0d0ec7a55

          SHA256

          5d082fe9de978a1da4657429b9502eccff9580849fc44736d813b71e59483f4b

          SHA512

          a98e75254fefdaf4ca676a20e22c2cbfcf78364de67844ca007db7019720de3acc6503e78d7e6c7ecd9acd6aa0c55669005d56d5fea58a3af89e30432bd92d18

        • memory/1948-17-0x0000000000400000-0x0000000000486000-memory.dmp

          Filesize

          536KB

        • memory/1948-18-0x00000000002F0000-0x0000000000311000-memory.dmp

          Filesize

          132KB

        • memory/1948-44-0x0000000000400000-0x0000000000486000-memory.dmp

          Filesize

          536KB

        • memory/2848-0-0x0000000000400000-0x0000000000486000-memory.dmp

          Filesize

          536KB

        • memory/2848-1-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2848-10-0x0000000000150000-0x0000000000171000-memory.dmp

          Filesize

          132KB

        • memory/2848-15-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2848-14-0x0000000000190000-0x0000000000216000-memory.dmp

          Filesize

          536KB

        • memory/2848-43-0x0000000000190000-0x0000000000216000-memory.dmp

          Filesize

          536KB