Analysis

  • max time kernel
    87s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/01/2024, 01:01

General

  • Target

    75f8c90b93156c1c2f7f165fc5d4e720.exe

  • Size

    605KB

  • MD5

    75f8c90b93156c1c2f7f165fc5d4e720

  • SHA1

    fea9946b96405aa7889ea544021ef7237447e961

  • SHA256

    706ea2f09851ca9d0faaa3a585b51bbbda30eb0b489b866507a0feb3f7e46351

  • SHA512

    e4d16ff4badb29e8e71a141ca96da65a495f6258a2b7325256dec0425b4cdc0d85ee27ef95dddca207472d032d617b8e07573c226375bb97ee826856457341b7

  • SSDEEP

    12288:Yc7esTXmoDmnQdcjdQ5f2uTevYZNIJuKipHm:NlGQCjdQ5+uav4NVa

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\75f8c90b93156c1c2f7f165fc5d4e720.exe
    "C:\Users\Admin\AppData\Local\Temp\75f8c90b93156c1c2f7f165fc5d4e720.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4700
    • C:\Users\Admin\AppData\Local\Temp\75f8c90b93156c1c2f7f165fc5d4e720.exe
      C:\Users\Admin\AppData\Local\Temp\75f8c90b93156c1c2f7f165fc5d4e720.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:3052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\75f8c90b93156c1c2f7f165fc5d4e720.exe

    Filesize

    115KB

    MD5

    212665831e45643fcc7920a1985e2ec1

    SHA1

    cd9f115edcea40bed413e45dca43cbd0d689ad52

    SHA256

    7f25f38757fae9778c522705f9f8bc16d71044f5990a4cd18e717aab27a04bd6

    SHA512

    6fbb6744f4c5f047f6b431f6a2741d2abac243e4cbec46cba629200b5eb3cdb45810028e808fc6013ae81de8144e4aca9f6dcec0e701c105e03532021c9c2d18

  • memory/3052-15-0x00000000014E0000-0x0000000001511000-memory.dmp

    Filesize

    196KB

  • memory/3052-17-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/3052-30-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/4700-0-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/4700-1-0x00000000014E0000-0x0000000001511000-memory.dmp

    Filesize

    196KB

  • memory/4700-2-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/4700-13-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB