Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    27/01/2024, 01:28

General

  • Target

    78ec3b1610ac8373f7b2815bbc7c7294.exe

  • Size

    5.5MB

  • MD5

    78ec3b1610ac8373f7b2815bbc7c7294

  • SHA1

    a13d08f87bab92c4fce282a27d6f2bdd8877d08c

  • SHA256

    2de5873d7345926b51be4c1a6ca1848346d065743dc9307ae906500421cd1bc5

  • SHA512

    9d10eed3ca1efbb1ab68162a78a68332387edb950713c9460584d4ae43564863aef00c639ba8c5bd16d5dee7b801514633e4917f69d157eaff75f1db6918622a

  • SSDEEP

    49152:bNWuX22Yp7tW2AIYiOSGXtCzOv1Kt0ltqWgouDfzay3vRmCFOGNj8mW4JH53R+wq:L22WGIFYEzg0gubL35mCckFR+vicS43

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\78ec3b1610ac8373f7b2815bbc7c7294.exe
    "C:\Users\Admin\AppData\Local\Temp\78ec3b1610ac8373f7b2815bbc7c7294.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2560
    • C:\Users\Admin\AppData\Local\Temp\78ec3b1610ac8373f7b2815bbc7c7294.exe
      C:\Users\Admin\AppData\Local\Temp\78ec3b1610ac8373f7b2815bbc7c7294.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\78ec3b1610ac8373f7b2815bbc7c7294.exe

    Filesize

    45KB

    MD5

    318012991299c8894842caa8142516fe

    SHA1

    8c64493d6aa97e4e9f47e2a5c08cc17d423525ae

    SHA256

    538c14c4204395d108cb7d9aec1183931ea72674437c73571e9378e0ac6b0944

    SHA512

    6a29c2e1e4b14edc8deb7be451f5b87c5149d6b61dc44f9ed4725aa021c2b21db2b795742396df055c438d5b4445366e47e229413d1ef02911ecd8d47812e637

  • \Users\Admin\AppData\Local\Temp\78ec3b1610ac8373f7b2815bbc7c7294.exe

    Filesize

    181KB

    MD5

    0bcf3b3ae2672eeec04b1eea0ed45ab2

    SHA1

    7aaef73aa31dd12b03819f8c48833d97e7a47357

    SHA256

    7869779da3910fa92641baa140d6d34c819c1a394783e7a0abbe11c6d7e3e2d8

    SHA512

    e8559c8039c570bc326ac46dea7eaa58e80a2e5e76132e9271f83f9880cafb85fdbe5eb1ccd9f0c2e7dccc3ef4cc0480a23c0b46ffef7389f6ec070319bd51f0

  • memory/2000-17-0x0000000002260000-0x00000000024BA000-memory.dmp

    Filesize

    2.4MB

  • memory/2000-19-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2000-42-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2560-1-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/2560-3-0x0000000001FA0000-0x00000000021FA000-memory.dmp

    Filesize

    2.4MB

  • memory/2560-0-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2560-15-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB