Analysis

  • max time kernel
    117s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13/01/2024, 07:18

General

  • Target

    5850cb893bcd1a640baf7b7d0e3fbd0c.exe

  • Size

    5.5MB

  • MD5

    5850cb893bcd1a640baf7b7d0e3fbd0c

  • SHA1

    55f4fce404d303a732e72f3f21fe47ee43976073

  • SHA256

    4f5e35717cc26171ea788cd64e71d7f5d2a11cedfcea647d7bd544c22d20fac5

  • SHA512

    411a0df11fdc76c3c295577e76baabd05f490e8dc085c87f410c6de2909af8096930fc7164aebb96006ed53ddcc729c53c4d06e07f4fd21e74ad0ce759dd6c63

  • SSDEEP

    49152:O+s06RQ7sBMmpzgT4rljLcX71GPwDFv5rkay3vRmCFOGNj8mW4JH53R+wVG+l0yg:OigMmpzgTuY4P+Ts35mCckFR+vicS43

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5850cb893bcd1a640baf7b7d0e3fbd0c.exe
    "C:\Users\Admin\AppData\Local\Temp\5850cb893bcd1a640baf7b7d0e3fbd0c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:832
    • C:\Users\Admin\AppData\Local\Temp\5850cb893bcd1a640baf7b7d0e3fbd0c.exe
      C:\Users\Admin\AppData\Local\Temp\5850cb893bcd1a640baf7b7d0e3fbd0c.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\5850cb893bcd1a640baf7b7d0e3fbd0c.exe

    Filesize

    782KB

    MD5

    bdefbf6b7a1195261182d539c1f55f28

    SHA1

    f6dd47d3e515da2c94a35aac232f91d77eb53a53

    SHA256

    f916dcb28162149ac5ec98b136a6628f14b0e364c2712d3f0be8147475d506c9

    SHA512

    67d14beab7bfb95b82a428a8490d6763f4fcf8ed4b716014079d8e4a7e14c33e3203c0b4ea388c22405e94a08e831e30a50eaed68f766e472ab952c34f061207

  • \Users\Admin\AppData\Local\Temp\5850cb893bcd1a640baf7b7d0e3fbd0c.exe

    Filesize

    44KB

    MD5

    12575281d3fc5376b5b5f27fb2be706a

    SHA1

    8012779dc63699b146e1fee32b89230af9f2a659

    SHA256

    254d9cc838b207136fdf162f0875fd6a4111df5f8b3f435b2dd067f0870d790c

    SHA512

    716861d41b050b48c3888fc90df3178deb7682868f469a83f2a38e7e169cb341f2305334999a1732ebf64478c84073a5332717bd493c612284fffe6a27f21ba0

  • memory/832-0-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/832-1-0x0000000001FA0000-0x00000000021FA000-memory.dmp

    Filesize

    2.4MB

  • memory/832-2-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/832-14-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/832-17-0x0000000004140000-0x0000000004ADE000-memory.dmp

    Filesize

    9.6MB

  • memory/832-43-0x0000000004140000-0x0000000004ADE000-memory.dmp

    Filesize

    9.6MB

  • memory/2432-20-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2432-22-0x0000000002220000-0x000000000247A000-memory.dmp

    Filesize

    2.4MB

  • memory/2432-44-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB