Analysis

  • max time kernel
    140s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13/01/2024, 21:50

General

  • Target

    597f841e9f4e8f60d48b252dab22a6de.exe

  • Size

    1003KB

  • MD5

    597f841e9f4e8f60d48b252dab22a6de

  • SHA1

    56e49b78f0395027ad0b68dd84f0da67302763df

  • SHA256

    716e2072276c0dabdd5e3334dfe385303c0da44b194b52b46f107c631dbd4a56

  • SHA512

    752e0116b494b2d2e871dd7a4562c5ca12f656cf3d1cc0d09d0d4b432b2ba893f6664ca06f25d168ce86acccf5af25286405ba754bcca2b1d978d5fdd8d524d5

  • SSDEEP

    24576:0xLPtvFTkHdCGwzkm8LiY+PcjukL2CDYibq6/yqLNaF:0xLPtvFTkHdVwzkm8LiY+PcakLz0ibq0

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\597f841e9f4e8f60d48b252dab22a6de.exe
    "C:\Users\Admin\AppData\Local\Temp\597f841e9f4e8f60d48b252dab22a6de.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1416
    • C:\Users\Admin\AppData\Local\Temp\597f841e9f4e8f60d48b252dab22a6de.exe
      C:\Users\Admin\AppData\Local\Temp\597f841e9f4e8f60d48b252dab22a6de.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:3036
  • C:\Windows\SysWOW64\schtasks.exe
    schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\597f841e9f4e8f60d48b252dab22a6de.exe" /TN QxutJGth3fd4 /F
    1⤵
    • Creates scheduled task(s)
    PID:2808
  • C:\Windows\SysWOW64\cmd.exe
    cmd.exe /c schtasks.exe /Query /XML /TN QxutJGth3fd4 > C:\Users\Admin\AppData\Local\Temp\qdCI7EdR.xml
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Windows\SysWOW64\schtasks.exe
      schtasks.exe /Query /XML /TN QxutJGth3fd4
      2⤵
        PID:2728

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\597f841e9f4e8f60d48b252dab22a6de.exe

      Filesize

      620KB

      MD5

      939168b03c67cdc05c16919104bdd1ed

      SHA1

      33f270e5b4db6d1dedc1833f02ec80eae66ec4c9

      SHA256

      d231146933a7450e53b62734dd967248ad362366ee7db076406c1163e4be2e8a

      SHA512

      545b6a3c8f056807ce97628163ad4b03e12f255a45b0e8937381d81ae9c9df64b0a5a801b72f3f62ed19c1762d60dd487fa7de221a1633cb32664fd97c1ab97a

    • C:\Users\Admin\AppData\Local\Temp\qdCI7EdR.xml

      Filesize

      1KB

      MD5

      7b3ac240ec6b8ad902deb0c1f9cf1ccd

      SHA1

      55edea8ffffef1e3838671f5180e0fa14b7f284d

      SHA256

      3f38587df6630c0c5ea488fcf118e4d4e22ffd60c0d101249200833d734b297a

      SHA512

      b4dfe218519fd5a2220d81568ce2dcd95d27ba670d8bdcd592ce9de4109c2f9e2bd2f36497ddb6d1a661cfc5e454e55144a7889ca49a3078235c901563654b6e

    • \Users\Admin\AppData\Local\Temp\597f841e9f4e8f60d48b252dab22a6de.exe

      Filesize

      433KB

      MD5

      d74611dff2baa2df902847aebbfae3d6

      SHA1

      65a8f903b2d11228f7f55ac763f4146f35b329ba

      SHA256

      9df855b63d79bafafbca2b030914d73c3c238af19080798690e77b6930f9e579

      SHA512

      f4f6d7bd9d648c5c6aa54e755281104b0842787f13d5b17878ad7ca139d6abd1d1d5074c840d0cc3239aa5a74abe35573f6a404b76c1432b3c99d45bef845d0b

    • memory/1416-1-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/1416-3-0x00000000001A0000-0x000000000021E000-memory.dmp

      Filesize

      504KB

    • memory/1416-0-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/1416-16-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/3036-18-0x0000000001660000-0x00000000016DE000-memory.dmp

      Filesize

      504KB

    • memory/3036-21-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/3036-30-0x0000000000390000-0x00000000003FB000-memory.dmp

      Filesize

      428KB

    • memory/3036-25-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/3036-53-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB