Analysis

  • max time kernel
    135s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/01/2024, 09:28

General

  • Target

    79e03e3eaabfb2c0c71860eee9e8457b.exe

  • Size

    5.1MB

  • MD5

    79e03e3eaabfb2c0c71860eee9e8457b

  • SHA1

    46b476c177fde0ed7fedca43d136ce72bee9f60a

  • SHA256

    48cb0021bd593681d7799e298581b62005e7fd516e932fe07c84272486d0c725

  • SHA512

    21bf889913a06e6d7b797138e5001afb0808683b05e9f608fee471e626cc2304bb18fcc6b3fd2b4162f170722b0bb061931e0eb06765a59f4e1df883639e6a49

  • SSDEEP

    98304:AJckXztDckn8I3YNDF3rHm3xc2RhsWdDMvlF3:xsxDck8I3kGBvhs44

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\79e03e3eaabfb2c0c71860eee9e8457b.exe
    "C:\Users\Admin\AppData\Local\Temp\79e03e3eaabfb2c0c71860eee9e8457b.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1280
    • C:\Users\Admin\AppData\Local\Temp\79e03e3eaabfb2c0c71860eee9e8457b.exe
      C:\Users\Admin\AppData\Local\Temp\79e03e3eaabfb2c0c71860eee9e8457b.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:3152

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\79e03e3eaabfb2c0c71860eee9e8457b.exe

    Filesize

    5.1MB

    MD5

    a199c9b56a9fb8d0c266d617c8ab0bf2

    SHA1

    e2ea2b3b17f057e8f17e78fad5174c315b1310bd

    SHA256

    6da2e9b1d16f1ad372c00c64525195b65c2560fa33f0a760d379f1a8862d8bb0

    SHA512

    e15e5ee5d57c7f6b8eb227a61e2ee98fb114fbdfd51138a3dea57d2d18f7edf8855e46c87ec2bb1dc72f36016334f1173eaf2efef0cede82f3dcbaed8817f03a

  • memory/1280-0-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/1280-1-0x0000000002140000-0x000000000239A000-memory.dmp

    Filesize

    2.4MB

  • memory/1280-2-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/1280-13-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/3152-14-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/3152-15-0x0000000002260000-0x00000000024BA000-memory.dmp

    Filesize

    2.4MB

  • memory/3152-31-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB