Analysis

  • max time kernel
    106s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-01-2024 02:51

General

  • Target

    5547f9bd232405bd29b4b289728a79a7.exe

  • Size

    5.5MB

  • MD5

    5547f9bd232405bd29b4b289728a79a7

  • SHA1

    9503b95db57e349131bd8bc7cfae4342cb411249

  • SHA256

    bf079723addd105517944f873f2374eedd938a681e83a5aebae0d8ae3af5e395

  • SHA512

    b97a1615ddab8fc1009fd49b4a05b1cf7a405c40df2b6eddf8e0fe180e2e07c7905aa68f0a516b995e7673cce26bc969d7b970cb2cc2dddb6993a9d30fb75a23

  • SSDEEP

    49152:1B7zYGiGf5ok9fpnhmS6jcFQvm1l8NNL9u6oQ5ay3vRmCFOGNj8mW4JH53R+wVGf:190GjOkfh2vZu6Z535mCckFR+vicS43

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5547f9bd232405bd29b4b289728a79a7.exe
    "C:\Users\Admin\AppData\Local\Temp\5547f9bd232405bd29b4b289728a79a7.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4004
    • C:\Users\Admin\AppData\Local\Temp\5547f9bd232405bd29b4b289728a79a7.exe
      C:\Users\Admin\AppData\Local\Temp\5547f9bd232405bd29b4b289728a79a7.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:3772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\5547f9bd232405bd29b4b289728a79a7.exe

    Filesize

    23KB

    MD5

    766702228fc9d62829b5a3f3839456b1

    SHA1

    a59b420b2827fce5fc2e95f025f7d6a9ff75a0f4

    SHA256

    84e805375099676ba78ade50064c6984274108d1c7022e4fabbc6581a5c8135b

    SHA512

    658e48599708b07430253cb80498a26193a0449e9f02c4df76fde7329d26ab859300a1e2282191c572adc89dc884429fc0f2859a03d269ec2010faafc8255965

  • memory/3772-17-0x0000000002280000-0x00000000024DA000-memory.dmp

    Filesize

    2.4MB

  • memory/3772-14-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/3772-30-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/4004-0-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/4004-1-0x0000000002370000-0x00000000025CA000-memory.dmp

    Filesize

    2.4MB

  • memory/4004-2-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/4004-13-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB