Analysis

  • max time kernel
    99s
  • max time network
    205s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    07/01/2024, 21:19

General

  • Target

    49cb6792f6c2ce89dd6cbf9858d3a2d0.exe

  • Size

    2.6MB

  • MD5

    49cb6792f6c2ce89dd6cbf9858d3a2d0

  • SHA1

    d3078cafbffeeac5754d8fbbc496fd982b866044

  • SHA256

    24506ba55a136709d33553b73a60ffb1a82b1a3fed37bf301faddfc8916a99ac

  • SHA512

    5773582068678b60ebe8d63aab1e9073d937d9c4a804e47fd513b62af3402816564afcbdc28276575b123be597876243d7334183d1776c9847814bd8587a30e2

  • SSDEEP

    49152:2W6XVvhyjFkIdcEvxqkhDDmE52+0p+lay3:2pvyJpdcOmpO3

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\49cb6792f6c2ce89dd6cbf9858d3a2d0.exe
    "C:\Users\Admin\AppData\Local\Temp\49cb6792f6c2ce89dd6cbf9858d3a2d0.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2868
    • C:\Users\Admin\AppData\Local\Temp\49cb6792f6c2ce89dd6cbf9858d3a2d0.exe
      C:\Users\Admin\AppData\Local\Temp\49cb6792f6c2ce89dd6cbf9858d3a2d0.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\49cb6792f6c2ce89dd6cbf9858d3a2d0.exe

    Filesize

    1.1MB

    MD5

    11b5de9c29d34ec15a98b35aac85a280

    SHA1

    6af910e27dfd60bbba55de1d2a7c7738013c6565

    SHA256

    38671a08514bbf80b0a6a281fec42d21f27e6fbcbc3ffed5c772a5e210e9505c

    SHA512

    0adbeee4f36c813107ba8aaf3acb7c30935b96b216fd749383d0c27c960133dbe704ae12d9beae73d66fc6d8b9698aacfc6da13dca5c75337c0234aea6cdb009

  • \Users\Admin\AppData\Local\Temp\49cb6792f6c2ce89dd6cbf9858d3a2d0.exe

    Filesize

    1.9MB

    MD5

    9d77c4b58d1d3f7651289d1ec60eb6cf

    SHA1

    773baf96b0ecdd6e4abb52acf92287c758a77f2a

    SHA256

    8c607c46f5084100fe04be97765d23acbc7fbb4e04586692f557e9bdef589b2d

    SHA512

    4e0939ce9474b78660a0b097fb6d3277f08930adafc6511ef418288e6565ac74f5bfbed0fd16ecf51d2cc06edf17dd3a013efefa2b5f24cd25b64226fb04d0ee

  • memory/2856-19-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2856-21-0x0000000001FA0000-0x00000000021FA000-memory.dmp

    Filesize

    2.4MB

  • memory/2856-43-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2868-0-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2868-1-0x0000000002200000-0x000000000245A000-memory.dmp

    Filesize

    2.4MB

  • memory/2868-2-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/2868-13-0x0000000003B00000-0x000000000449E000-memory.dmp

    Filesize

    9.6MB

  • memory/2868-16-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB