Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    13/01/2024, 22:00

General

  • Target

    598479f169f3bc1670c3cd71d3813451.exe

  • Size

    605KB

  • MD5

    598479f169f3bc1670c3cd71d3813451

  • SHA1

    779a88a9907776fdf430d2d7bba418d1c9ea0068

  • SHA256

    21586cca9b0bfc2ab68a99fb6fc701971522d9c1d2df2569acca7726df25c190

  • SHA512

    fa4efb7b7091acb50f16dc33548a97ad5d02007f24711adb901939cbb78c8c76cf4b7b7f5a27d30ecf46d69f1f96fb9d1e3fa6666d29841538190c6907eac504

  • SSDEEP

    12288:S2tNQvZIc3gdJWCFGmba4wvPqTzz++xPeWQm:SxIcwuktTzqjWX

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\598479f169f3bc1670c3cd71d3813451.exe
    "C:\Users\Admin\AppData\Local\Temp\598479f169f3bc1670c3cd71d3813451.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2972
    • C:\Users\Admin\AppData\Local\Temp\598479f169f3bc1670c3cd71d3813451.exe
      C:\Users\Admin\AppData\Local\Temp\598479f169f3bc1670c3cd71d3813451.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:3040

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\598479f169f3bc1670c3cd71d3813451.exe

    Filesize

    605KB

    MD5

    3c5f7c1afe7271afa088f8384ee7903d

    SHA1

    7258a9721dca535610a8f9f15f79725d250a4f08

    SHA256

    c6887e97bca8e170bb44ea1ff6e83d5273eb836a524886ab6c78a156d96cda1d

    SHA512

    25b06fe3f69225b4ad4adc600d960691d67553271e53ee789800a373f1216e490cce5e294f3a5c4f853a7a14a65f2cfbfc03945ccc682e3364a9d891cc872df2

  • \Users\Admin\AppData\Local\Temp\598479f169f3bc1670c3cd71d3813451.exe

    Filesize

    458KB

    MD5

    be8c19058ce7c341ba2073a185a9e750

    SHA1

    099c9f3a17628543f83f09940b5393d96926f3e2

    SHA256

    a902bcbc9e9f4ee12997c4dedb59bf6e6903e7c801ba855e0f18b3ad94d79559

    SHA512

    49b55525df82cef1b0b02e00478dbd737bdc52b142e4a6c1cd8fedd353d1ad9cf68bf1138c750209c50f1307a9cfbe62a005e56c5787dfa1b78a919970f010ca

  • memory/2972-0-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/2972-1-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2972-9-0x0000000000160000-0x0000000000191000-memory.dmp

    Filesize

    196KB

  • memory/2972-16-0x0000000000260000-0x0000000000340000-memory.dmp

    Filesize

    896KB

  • memory/2972-15-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/3040-19-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/3040-21-0x0000000000160000-0x0000000000191000-memory.dmp

    Filesize

    196KB

  • memory/3040-35-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB