Analysis

  • max time kernel
    120s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    09/01/2024, 13:02

General

  • Target

    4e5ed707bd61e6261f529efdbb49df6c.exe

  • Size

    1003KB

  • MD5

    4e5ed707bd61e6261f529efdbb49df6c

  • SHA1

    2657fc2b1621a1453e5b4a2baa586d321084d1d5

  • SHA256

    dbb563af320c2c9773eb22d497bda9308639eec561d52da829b75bce00d4eb83

  • SHA512

    6b093c7b750a676ec90bd565c6be967d8be2a6c6306f7fda31de2f297157454ea1ce8dd55ed5e5b9172dab9dcc8eec54d9f41213e5c3a02be5d4b6e73da0f6af

  • SSDEEP

    24576:4zyDtLN6dkDvzxcjukL2CDYibq6/yqLNaF:4zyDtLNJbzxcakLz0ibq6yqh

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e5ed707bd61e6261f529efdbb49df6c.exe
    "C:\Users\Admin\AppData\Local\Temp\4e5ed707bd61e6261f529efdbb49df6c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Users\Admin\AppData\Local\Temp\4e5ed707bd61e6261f529efdbb49df6c.exe
      C:\Users\Admin\AppData\Local\Temp\4e5ed707bd61e6261f529efdbb49df6c.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:608
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\4e5ed707bd61e6261f529efdbb49df6c.exe" /TN BSpsfata099d /F
        3⤵
        • Creates scheduled task(s)
        PID:2660
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN BSpsfata099d > C:\Users\Admin\AppData\Local\Temp\UVNxbFig.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2092
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN BSpsfata099d
          4⤵
            PID:2712

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\UVNxbFig.xml

      Filesize

      1KB

      MD5

      bab457e7e8d362e4ce5053f529f0eb66

      SHA1

      04e5ca8e104dc7d120798e7a0761f87e391e926f

      SHA256

      c147964d71bdbdc1ad82f1147a0f0f5d00f8764c33ddf1a67840f417d765eb60

      SHA512

      82f43e91238e08227028d46a289ffe0cb5b7726be4af014802a6c9bc72fefc1585702bd906042b8042438e5619aaadc4cf5af8a71e1954c2c09be60f7a8ade73

    • \Users\Admin\AppData\Local\Temp\4e5ed707bd61e6261f529efdbb49df6c.exe

      Filesize

      1003KB

      MD5

      9c9c5659b3c4674dbf91715d2b587704

      SHA1

      fc694f9a4db29d9230d2f6ccda3690144a4f2602

      SHA256

      09c73f48ddfebe3ce0bb56106844c926811cfc8380cc16fa98fb40d6304982c4

      SHA512

      4325d156d3e02fe8b2625c5957396211ec258c8a5e6beb1e88255763e77b309670871d62d507fe1079e4c9d60bdb0bbd36ed8c53bec78854e0a8c9b0c87eefa0

    • memory/608-19-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/608-21-0x0000000001660000-0x00000000016DE000-memory.dmp

      Filesize

      504KB

    • memory/608-26-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/608-28-0x0000000000470000-0x00000000004DB000-memory.dmp

      Filesize

      428KB

    • memory/608-53-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2000-0-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2000-1-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/2000-3-0x0000000022D90000-0x0000000022E0E000-memory.dmp

      Filesize

      504KB

    • memory/2000-16-0x0000000022F20000-0x000000002317C000-memory.dmp

      Filesize

      2.4MB

    • memory/2000-15-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB