Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/01/2024, 21:26

General

  • Target

    786ecfa8465759e2c8d14abf000977f8.exe

  • Size

    133KB

  • MD5

    786ecfa8465759e2c8d14abf000977f8

  • SHA1

    28d1dcda539c73a205d00cf2a36b7e9409bea709

  • SHA256

    4a83cf217b36e09518995ea7726f80cf11cd5f1d5862e36f93eee8621418f7d6

  • SHA512

    205c656f62fe72cec37e046ee0b9ae5b99e8ed5b0aaede8df1cdc007b53ad8ce9daa6b0968703091969e91f7ee86c9cac39b1b86a5718a9cf08b7f0f4a11af27

  • SSDEEP

    3072:VJJvvcd2SLvLhnnFNgnK0dQevC57wKk5HDGMqN+EQqA8IEQ:VJRvF4tnFNPMC85Hi/MEQqA8dQ

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\786ecfa8465759e2c8d14abf000977f8.exe
    "C:\Users\Admin\AppData\Local\Temp\786ecfa8465759e2c8d14abf000977f8.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4976
    • C:\Users\Admin\AppData\Local\Temp\786ecfa8465759e2c8d14abf000977f8.exe
      C:\Users\Admin\AppData\Local\Temp\786ecfa8465759e2c8d14abf000977f8.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:4452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\786ecfa8465759e2c8d14abf000977f8.exe

    Filesize

    133KB

    MD5

    7792146da1512ab0c454bb2412ec0fb0

    SHA1

    ed2d4433dffc5b5a0eeb3acba48e572f1d27a937

    SHA256

    6d5300008743acd1d3c36e5d32442c793b8d6277d89c219ef5a9b176b0a1b1f5

    SHA512

    0ebebb0862b903621a33b266e7a4b33ad970d7d57591606fb36fcf8ad930b2cc7325d000776574616c9817fdb9eabb008b9fc3c4fb82409fbad555af5552e782

  • memory/4452-15-0x00000000001A0000-0x00000000001C1000-memory.dmp

    Filesize

    132KB

  • memory/4452-18-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/4452-31-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/4976-0-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/4976-1-0x00000000001C0000-0x00000000001E1000-memory.dmp

    Filesize

    132KB

  • memory/4976-2-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4976-14-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB