Analysis

  • max time kernel
    166s
  • max time network
    185s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    07/01/2024, 11:48

General

  • Target

    48e5c068464d1e32e78954197a0e9561.exe

  • Size

    133KB

  • MD5

    48e5c068464d1e32e78954197a0e9561

  • SHA1

    1fb280f82f949471e0cc864e85e9f638e75aee8d

  • SHA256

    a5df95a43c2910713f222e1057521472f12fdbb9536e25c86b844ab926fadbe9

  • SHA512

    06c204a24b1a8ce61a3fb2c38c41dc47c0e98d1a4d85eb01795c2d6d5d2d34d2fff69cf9656b6f2f3cb72b34bf8540b84ea6167e332e8473e2f98157510b3a0f

  • SSDEEP

    3072:ITrEZWC09wOU99kDKpZ3e0+zUGxgbZnTuRQ:IeWjw9BZYzvxguRQ

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\48e5c068464d1e32e78954197a0e9561.exe
    "C:\Users\Admin\AppData\Local\Temp\48e5c068464d1e32e78954197a0e9561.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2820
    • C:\Users\Admin\AppData\Local\Temp\48e5c068464d1e32e78954197a0e9561.exe
      C:\Users\Admin\AppData\Local\Temp\48e5c068464d1e32e78954197a0e9561.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\48e5c068464d1e32e78954197a0e9561.exe

    Filesize

    133KB

    MD5

    a3c8e24380e6df21ba3217d8f1da17e3

    SHA1

    dac22e72f478746176a5a7bb56b33ce0c02ebf1d

    SHA256

    b19271828fbfabd29eea7c1d52ef60eb408bac5ef1a34def3f55c554f66b1ee0

    SHA512

    096738905d8874d4849ac9d2b3c62f8f8bd336b983a7afc72e2d1ef7ee2201c5588ec09e895c4ffb414afe7274cf0619b4d73a351759c4e85bec44773adac66b

  • memory/2812-17-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2812-19-0x00000000001E0000-0x0000000000201000-memory.dmp

    Filesize

    132KB

  • memory/2812-25-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2820-0-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2820-2-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2820-1-0x0000000000150000-0x0000000000171000-memory.dmp

    Filesize

    132KB

  • memory/2820-15-0x0000000000190000-0x0000000000216000-memory.dmp

    Filesize

    536KB

  • memory/2820-14-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB