Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/01/2024, 22:29

General

  • Target

    5992fff34f44e47ee4413130268dfc55.exe

  • Size

    2.7MB

  • MD5

    5992fff34f44e47ee4413130268dfc55

  • SHA1

    db7f6c01aa17525c51e8da13685d395dc9e4c749

  • SHA256

    ba67bb9687a9533d754358c7b7e59263282b2b7b539b66122e7ffbdfb02aa1a7

  • SHA512

    1d3bfe7698c1f071260b4adad79feec4f38c8bd340af3445b29f1d9a0f764615b131f1351017b18deb936156e928edfffc7980626797b9d6c455314fb2d51bf4

  • SSDEEP

    49152:ROjp0AzVwzipY5wqjlLFLnPXqVVPysErafwYO:ROF1VwzipgwqjjP0PysGCxO

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5992fff34f44e47ee4413130268dfc55.exe
    "C:\Users\Admin\AppData\Local\Temp\5992fff34f44e47ee4413130268dfc55.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4756
    • C:\Users\Admin\AppData\Local\Temp\5992fff34f44e47ee4413130268dfc55.exe
      C:\Users\Admin\AppData\Local\Temp\5992fff34f44e47ee4413130268dfc55.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:232

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\5992fff34f44e47ee4413130268dfc55.exe

    Filesize

    420KB

    MD5

    bbcf62d206292bc7f25d56aefd0ecf71

    SHA1

    b4f95a17de3506ef16cfaedb297ae0a659a51f93

    SHA256

    30b940e9e1fdbd603f14092317fde5d59f383bf38a64c185a5270567f9370d9e

    SHA512

    f37ddf025c1f804e1659a3a883e90cd18abb5f980514222ff57ee0f0ab5b2834999b3dec6d0dd3f93b496efa6e394925069ac93f811e47fccba8e0d81520f2be

  • memory/232-17-0x0000000000400000-0x00000000005F2000-memory.dmp

    Filesize

    1.9MB

  • memory/232-16-0x0000000001C10000-0x0000000001D22000-memory.dmp

    Filesize

    1.1MB

  • memory/232-14-0x0000000000400000-0x000000000086A000-memory.dmp

    Filesize

    4.4MB

  • memory/232-24-0x0000000000400000-0x000000000086A000-memory.dmp

    Filesize

    4.4MB

  • memory/4756-1-0x0000000001C50000-0x0000000001D62000-memory.dmp

    Filesize

    1.1MB

  • memory/4756-0-0x0000000000400000-0x000000000086A000-memory.dmp

    Filesize

    4.4MB

  • memory/4756-2-0x0000000000400000-0x00000000005F2000-memory.dmp

    Filesize

    1.9MB

  • memory/4756-15-0x0000000000400000-0x00000000005F2000-memory.dmp

    Filesize

    1.9MB