Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    07/01/2024, 21:11

General

  • Target

    49c6ee12f4427b74cc65321af936d8ae.exe

  • Size

    2.6MB

  • MD5

    49c6ee12f4427b74cc65321af936d8ae

  • SHA1

    1500231748f45af905bb211d64cda32d21757e9d

  • SHA256

    79e4d78a4850ca0242af627df4f1445e715446581592c1f54ead7b957fa09baf

  • SHA512

    a3361a242173d4eaa3c19c53dc35663526a9cd91a2455ae30e42a591b77cef6348e35dfb739972438e2e598d91af33d14cfa6b616494b45ac4fedeca02797184

  • SSDEEP

    49152:rEGJjo5LiHA+VseTdi4qk4jkaU7c2pxkj8odpJaMX5s6CJ4ay3:u5Xexi44jkaZ2M0M+u3

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\49c6ee12f4427b74cc65321af936d8ae.exe
    "C:\Users\Admin\AppData\Local\Temp\49c6ee12f4427b74cc65321af936d8ae.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2224
    • C:\Users\Admin\AppData\Local\Temp\49c6ee12f4427b74cc65321af936d8ae.exe
      C:\Users\Admin\AppData\Local\Temp\49c6ee12f4427b74cc65321af936d8ae.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\49c6ee12f4427b74cc65321af936d8ae.exe

    Filesize

    1008KB

    MD5

    d6ba25c4596dae6326708cf8b15b7153

    SHA1

    856453327a4ec941891dec7a851904b070b54413

    SHA256

    36f8d2c7e3ee7abbe55cfd59d72bff74c6984ccdf39dd0cc9507c0090351e6ca

    SHA512

    689bf74ed0df0d711066eeaf3415084fc6a2a57dea3aa7737fb1c5bfea740691643e2ba2a673fbecdeb31abc3c64fe41dc60cf0122486d4509dea961a3536e39

  • C:\Users\Admin\AppData\Local\Temp\49c6ee12f4427b74cc65321af936d8ae.exe

    Filesize

    1.3MB

    MD5

    e9c3956109174f2958ee01e846017039

    SHA1

    7af32aeb6c60de74f399d7b820c2d64de88ac8a6

    SHA256

    14c4948f8071102cad78ade3403dba77e2801aa359fde19c47fb22fe9fea3788

    SHA512

    eef26ce0d8d2b25939e50b7f30f18a9eebf69bec3c435745e1ef18b346717d3f43a3a362269aaec1ce5bdf5982260420558fe461b33f414168a6287996d3110e

  • \Users\Admin\AppData\Local\Temp\49c6ee12f4427b74cc65321af936d8ae.exe

    Filesize

    1.2MB

    MD5

    0e0ddf6441cdf8cbb0d32364dcdf2db9

    SHA1

    1b1f8afcb0db4edb0e0654e0e77f1c3e642501c8

    SHA256

    69810e5d10a4770d36713de8fc74190c5ceb3ce7571f2cae3e1c79cba35ab9cb

    SHA512

    206a57f41143e53382963656209675fa023159ca464060915bb959767503a6bd9af0e464498a9279100b0dbd04f9d37d638346f37562f684aad95528375a4a9c

  • memory/2224-0-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/2224-3-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2224-5-0x0000000002210000-0x000000000246A000-memory.dmp

    Filesize

    2.4MB

  • memory/2224-15-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/2224-16-0x0000000003B10000-0x00000000044AE000-memory.dmp

    Filesize

    9.6MB

  • memory/2224-42-0x0000000003B10000-0x00000000044AE000-memory.dmp

    Filesize

    9.6MB

  • memory/2704-18-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2704-20-0x0000000001FA0000-0x00000000021FA000-memory.dmp

    Filesize

    2.4MB

  • memory/2704-43-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB