Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/01/2024, 17:24

General

  • Target

    7515f6a110e269d692c83ce6639f87a9.exe

  • Size

    7.8MB

  • MD5

    7515f6a110e269d692c83ce6639f87a9

  • SHA1

    9df0bd528dba8bf3bb06727c5a883d26e9779320

  • SHA256

    faf97b6b3d5f05002eafb3f1938d32ba76c9a80119c14ba57a6c13ba1d8e6bcf

  • SHA512

    1d31985b92640e1a05c7855474a44ec5d69e839af930087aa6f8f8723ea735b67c925c38dc323918e5ad9a7065108f90c4a81e3029cf108f047a41bac07647f2

  • SSDEEP

    196608:XO8dlirybMgOnkdlirPUedlirybMgOnkdlirx+fSBdlirybMgOnkdlirPUedlirV:XOebMrn7U0bMrn0fUbMrn7U0bMrn

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7515f6a110e269d692c83ce6639f87a9.exe
    "C:\Users\Admin\AppData\Local\Temp\7515f6a110e269d692c83ce6639f87a9.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2536
    • C:\Users\Admin\AppData\Local\Temp\7515f6a110e269d692c83ce6639f87a9.exe
      C:\Users\Admin\AppData\Local\Temp\7515f6a110e269d692c83ce6639f87a9.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:1708
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\7515f6a110e269d692c83ce6639f87a9.exe" /TN U5Z8sQiHf24d /F
        3⤵
        • Creates scheduled task(s)
        PID:2764
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN U5Z8sQiHf24d > C:\Users\Admin\AppData\Local\Temp\xRhlSlZ9p.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2792
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN U5Z8sQiHf24d
          4⤵
            PID:2732

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\7515f6a110e269d692c83ce6639f87a9.exe

      Filesize

      2.4MB

      MD5

      4abb7bf07728dafc81a6940c8dd31242

      SHA1

      cfa8d30e593e4e13ecad4f21d0f7884a361be9b5

      SHA256

      511a69d59082f017a0abbc3cf8905333a109fffbcaab353ba7138ea7dcbbabd0

      SHA512

      abf9b9788bde7e89d84bc67966c63791f1912783e531fbe2b1e1202bfc2645ada0c20d9f70cf274e4c16d0917d1df12757a8a69adf14a97f7d85f5ab16c9c285

    • C:\Users\Admin\AppData\Local\Temp\xRhlSlZ9p.xml

      Filesize

      1KB

      MD5

      9de40575debe1085e82e7c0a030b99ea

      SHA1

      931cf3e10a60759a77eec805a7574279ef872d1a

      SHA256

      25f73ba3d3992d858d90a5eb39ed17ebd0aef5ffb8fe6d9fbe41945e465849b4

      SHA512

      2ea8c9d70f005f07040fabc0c4ad906e1be02926983247308b892b7d9b85423baa8b1446262ef9e558148f4292aebc67ca35c1ca2e01e829e73c7d099a6d2844

    • \Users\Admin\AppData\Local\Temp\7515f6a110e269d692c83ce6639f87a9.exe

      Filesize

      2.6MB

      MD5

      79c711be55f068e1f079818803027f41

      SHA1

      bb09f38eafcd7b24882836944b5bb2504a9ea8fb

      SHA256

      2cc399df5818ff379722991856af9d043b1fd267493e02e606162a4c31cde32b

      SHA512

      a2b4828594ce8fd26790da5122f9c0ecb74da02b043a7e93d70cf39352113bb0840427b75e3e6f000c24aca5c5dea66d26603a1a070c5949a89438f148556972

    • memory/1708-26-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/1708-19-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/1708-21-0x0000000000280000-0x00000000002FE000-memory.dmp

      Filesize

      504KB

    • memory/1708-31-0x0000000000300000-0x000000000036B000-memory.dmp

      Filesize

      428KB

    • memory/1708-54-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2536-4-0x00000000001A0000-0x000000000021E000-memory.dmp

      Filesize

      504KB

    • memory/2536-16-0x0000000024020000-0x000000002427C000-memory.dmp

      Filesize

      2.4MB

    • memory/2536-15-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/2536-0-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/2536-2-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB