Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    07/01/2024, 23:08

General

  • Target

    4a0408353f5acecfa87a7148c902b69f.exe

  • Size

    11.0MB

  • MD5

    4a0408353f5acecfa87a7148c902b69f

  • SHA1

    07e1586ca467b960e5dfa43c20f121963fd89772

  • SHA256

    926d58fc15937197f51095f53be141c9c59fe29b6e8921625648c698be050e1f

  • SHA512

    749cee3339fb5f9ad919e5b7d18447e77de6864a22a8056fb54fcb101c12fd8e7f59da75f3ccd9b145ef133c307b1fbff9b7d46aeaf7bcee91c39ee7446988ff

  • SSDEEP

    196608:Izo0uKqYU33FR+6crrcwxSccSv9233FR+6c:kTGYU+RrpSq1y+R

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4a0408353f5acecfa87a7148c902b69f.exe
    "C:\Users\Admin\AppData\Local\Temp\4a0408353f5acecfa87a7148c902b69f.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2308
    • C:\Users\Admin\AppData\Local\Temp\4a0408353f5acecfa87a7148c902b69f.exe
      C:\Users\Admin\AppData\Local\Temp\4a0408353f5acecfa87a7148c902b69f.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2408

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\4a0408353f5acecfa87a7148c902b69f.exe

    Filesize

    92KB

    MD5

    2d29bc2740fa3f04e04dc626ff65646f

    SHA1

    9b450f5213e5b39065a1176c62a4394f27064298

    SHA256

    431c672a27a8f24e05b178985bec503322e47a96534847824c7d68ad80308acb

    SHA512

    fe12efddc40e028084afd42fc768821c343a9c642f7ab178f8b9f48e5d983adf7dacae223607ca5e62cff156d9277874f79dcf2dd38f6098be47d43b649a3729

  • \Users\Admin\AppData\Local\Temp\4a0408353f5acecfa87a7148c902b69f.exe

    Filesize

    384KB

    MD5

    86ec405acfc2b87067f0ddd7e62b4348

    SHA1

    9f8d3ab9e0efdf076cb44413a826dfe095046726

    SHA256

    394dc442ac970d1132d91c9cdc6bcd53adc883d05d3857316239749e4f18b753

    SHA512

    f4e342c1a8fc9691b275b77bf3ba8bd2aabfcffb491270144b3b41989ca126833e8e2217687cf41da2421e1a13fb2044b72737d83b948aac6a3827f151d83d3e

  • memory/2308-0-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/2308-1-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2308-4-0x00000000021F0000-0x000000000244A000-memory.dmp

    Filesize

    2.4MB

  • memory/2308-14-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/2308-16-0x0000000004E90000-0x000000000582E000-memory.dmp

    Filesize

    9.6MB

  • memory/2308-42-0x0000000004E90000-0x000000000582E000-memory.dmp

    Filesize

    9.6MB

  • memory/2408-19-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2408-22-0x00000000021B0000-0x000000000240A000-memory.dmp

    Filesize

    2.4MB

  • memory/2408-43-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB