Analysis

  • max time kernel
    143s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12/01/2024, 09:21

General

  • Target

    5612603a71f3ec5ea43e2349f67ac7cb.exe

  • Size

    3.2MB

  • MD5

    5612603a71f3ec5ea43e2349f67ac7cb

  • SHA1

    b7e0b18359393e844ee3adc7e12c71fa9338a88c

  • SHA256

    cbeb22baadb651aad9315ae8d14f756ff7af2888cfb11c22ab3c0958bfff57a0

  • SHA512

    531631ddcc598c418f956cc6deda86cd63a43773f7ca1c2673d2a7fec29d64180adcc1e10353a60ce5465bf6a717570567803e839f6423c176e31e4b42fd9aae

  • SSDEEP

    98304:pVVvCW7cakcQK48/nBcakcxsuK8nB40cakcQK48/nBcakcO:PVvRdlQq/BdlxX40dlQq/BdlO

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5612603a71f3ec5ea43e2349f67ac7cb.exe
    "C:\Users\Admin\AppData\Local\Temp\5612603a71f3ec5ea43e2349f67ac7cb.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Users\Admin\AppData\Local\Temp\5612603a71f3ec5ea43e2349f67ac7cb.exe
      C:\Users\Admin\AppData\Local\Temp\5612603a71f3ec5ea43e2349f67ac7cb.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2268
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\5612603a71f3ec5ea43e2349f67ac7cb.exe" /TN Nnb8kaFf43a4 /F
        3⤵
        • Creates scheduled task(s)
        PID:2980
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN Nnb8kaFf43a4 > C:\Users\Admin\AppData\Local\Temp\ZWEDionv.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2856
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN Nnb8kaFf43a4
          4⤵
            PID:2796

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\5612603a71f3ec5ea43e2349f67ac7cb.exe

      Filesize

      1.3MB

      MD5

      b45f3b9711a728262f6e7c37307341e7

      SHA1

      cea6930d15e57a302bceda01e398ba6a0d3339f5

      SHA256

      efa5daf31807f24c8168c22cfdefa9c082b0d9322c671541943ddd80e93d67a8

      SHA512

      f54b218dac3cffcdfcaf92dbad480a0d2e8171005406e05d2b17605e23bd8fa79019517831865b6aeb103c215b0694aaf4f43265a3ba965d2a89d15ffcad4cc9

    • C:\Users\Admin\AppData\Local\Temp\ZWEDionv.xml

      Filesize

      1KB

      MD5

      775acbf08b2e24a1d10bf070e4d7d576

      SHA1

      4d784b19051d8e58c90c9ac8e12d582006dc6753

      SHA256

      cdb8986d945e8b724f57a97c707407e9d94d5dd473604d33612d876f6df0742a

      SHA512

      9649ff58809aa8c8d824b78b08e4e670ffcf903796b5acee3998846e275ad733da1e43ad2c25787a7719aa54ccab2e7efa0d4165bfc63a319e02d7645a12699d

    • \Users\Admin\AppData\Local\Temp\5612603a71f3ec5ea43e2349f67ac7cb.exe

      Filesize

      2.4MB

      MD5

      ec544939f49c348679a85432260db595

      SHA1

      0ea2dadc3a89535b90fa639484ab166c78d34a6d

      SHA256

      7dc89393288ae2176833a77d87987d13b3422294d566d43ba8b521217f9a615d

      SHA512

      8e0c7dc8273c1eb02f164c0cf153efa06a0a2fce3dc97c0a9768163fb40d9ca12978c1d0ab4493a5ca0d1c2f5aeb7cf29568284cf58a20294610b0cd2586e24c

    • memory/2212-16-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/2212-0-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2212-1-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/2212-15-0x00000000236C0000-0x000000002391C000-memory.dmp

      Filesize

      2.4MB

    • memory/2212-2-0x00000000001A0000-0x000000000021E000-memory.dmp

      Filesize

      504KB

    • memory/2212-53-0x00000000236C0000-0x000000002391C000-memory.dmp

      Filesize

      2.4MB

    • memory/2268-19-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2268-20-0x00000000002B0000-0x000000000032E000-memory.dmp

      Filesize

      504KB

    • memory/2268-26-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/2268-31-0x0000000000330000-0x000000000039B000-memory.dmp

      Filesize

      428KB

    • memory/2268-54-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB