Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    13/01/2024, 20:28

General

  • Target

    59575176831a8f110bb69b8612c511ac.exe

  • Size

    10.0MB

  • MD5

    59575176831a8f110bb69b8612c511ac

  • SHA1

    72c3209d4bf682af15dad3866648793eca78d2d5

  • SHA256

    d7d451f5bf654a791d8f4aec42e372a734c514d36c84646cb7b998e5c394a5b6

  • SHA512

    d31b4f05c2aeac1abbe98e028951b18b12fa019f965b6d385fad90ed35b77c6ae9a95f447e52a38492ee8e6eae015b6e33ca0e84c13b91cb1ed8fc11b593b4bf

  • SSDEEP

    98304:wNWcJF/O3bDASe+oaIGy0E5WdmKEPvM11Pr5vX5PQ+oaIGy0E5Wd:m5X/+hexaBrmtoPr5vRQxaBr

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\59575176831a8f110bb69b8612c511ac.exe
    "C:\Users\Admin\AppData\Local\Temp\59575176831a8f110bb69b8612c511ac.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\Users\Admin\AppData\Local\Temp\59575176831a8f110bb69b8612c511ac.exe
      C:\Users\Admin\AppData\Local\Temp\59575176831a8f110bb69b8612c511ac.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:3068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\59575176831a8f110bb69b8612c511ac.exe

    Filesize

    512KB

    MD5

    2b82a3402af6bb89814c1586638298e2

    SHA1

    7249f2dbf89df28a5ca47b3296c3a08067064028

    SHA256

    b6950cb1e4f104004f5cdf4381b3cbb540c9a403496203216f1b0c7fd5071387

    SHA512

    680269f687f8b0c5dd24807663374993017ebb97665729d140805ceb0ab3f146e7b98b0ff017697f95cb358164d35c6b6385a0e5d8ddde4917586487767470b3

  • \Users\Admin\AppData\Local\Temp\59575176831a8f110bb69b8612c511ac.exe

    Filesize

    455KB

    MD5

    3272ca0b7cd1719008fc2ea95002c280

    SHA1

    4b49bd8b80dd70f76857418e21885dacbd4ca8ed

    SHA256

    6f38f61cd6e3077a2100a6343933a0b87ac76a2650499fc71453a97aa0a0ec46

    SHA512

    54110ad917f2b1aa79febc7afc2ae5e8b4bd5ba2c4ccd7fb19826ce56361a0c9d4a9a966603ff2007566cd35634707ee5ba17edd2ef60decbe007d4d7e0512f5

  • memory/2360-0-0x0000000000400000-0x00000000005EF000-memory.dmp

    Filesize

    1.9MB

  • memory/2360-2-0x0000000000400000-0x0000000000CE1000-memory.dmp

    Filesize

    8.9MB

  • memory/2360-4-0x0000000002110000-0x000000000233E000-memory.dmp

    Filesize

    2.2MB

  • memory/2360-16-0x0000000004B60000-0x0000000005441000-memory.dmp

    Filesize

    8.9MB

  • memory/2360-15-0x0000000000400000-0x00000000005EF000-memory.dmp

    Filesize

    1.9MB

  • memory/3068-19-0x0000000000400000-0x0000000000CE1000-memory.dmp

    Filesize

    8.9MB

  • memory/3068-21-0x0000000001EE0000-0x000000000210E000-memory.dmp

    Filesize

    2.2MB

  • memory/3068-35-0x0000000000400000-0x0000000000CE1000-memory.dmp

    Filesize

    8.9MB