Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    27/01/2024, 14:25

General

  • Target

    7a7b5d28bb0ea5fc228783a848684ccb.exe

  • Size

    501KB

  • MD5

    7a7b5d28bb0ea5fc228783a848684ccb

  • SHA1

    b3dfae5d71f70948d54a6713e5835ea8678e1a64

  • SHA256

    ca22bbed251075e6eed5cd365615f6cda60c71aa1039910f9e6e86248ed3bf2f

  • SHA512

    9445664301aa9fee1b22c9703ea64deaf25ed40cabf61b3c8b960220b801e4006bacd35ecb3e7110c6c976116dbcdfb3a651b0bbaac93204eaef2eeab2aae19c

  • SSDEEP

    12288:gFBPvMo5Rvy7xF8aYMEo1hgm1FnWfilCj:is6CF9hFhMj

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a7b5d28bb0ea5fc228783a848684ccb.exe
    "C:\Users\Admin\AppData\Local\Temp\7a7b5d28bb0ea5fc228783a848684ccb.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Users\Admin\AppData\Local\Temp\7a7b5d28bb0ea5fc228783a848684ccb.exe
      C:\Users\Admin\AppData\Local\Temp\7a7b5d28bb0ea5fc228783a848684ccb.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:3024
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\7a7b5d28bb0ea5fc228783a848684ccb.exe" /TN qm2lmOfce5f6 /F
        3⤵
        • Creates scheduled task(s)
        PID:2576
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN qm2lmOfce5f6 > C:\Users\Admin\AppData\Local\Temp\jyEwBu.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2688
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN qm2lmOfce5f6
          4⤵
            PID:2712

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\jyEwBu.xml

      Filesize

      1KB

      MD5

      7be5c89f5ed6d87fd6ea601d75dccaa0

      SHA1

      7ac968f909372311373cb0fecf236bd8b59e3e70

      SHA256

      65a25b13784353d4a51b6beefe46ac433bb1b8efd174f9b7f70da544d2b4d8b4

      SHA512

      f87e7fe87212d6ac57e242c64afe4f34686a67a63e05fdb412128e110a97426d7b639a085d040621d0033e74a253537d971f64b548118b0773508f71d6de88f8

    • \Users\Admin\AppData\Local\Temp\7a7b5d28bb0ea5fc228783a848684ccb.exe

      Filesize

      501KB

      MD5

      082b0e413678e4a8593929971518f407

      SHA1

      14aed49838da9bc9dba164a0b782359b0d8c1e65

      SHA256

      aa0feaae8d2cd95fb792132a336888270918238afa6868191058b09fcc4d7598

      SHA512

      63967fca99c89f653b1e92ec4b10c4ca6efdc453d2ba914293208be881d6cfe5df9c6ce4147f80ffd6c28985991e5bc24099047671d85e6aa574b64ae2ca3daf

    • memory/3012-0-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/3012-2-0x00000000001A0000-0x000000000021E000-memory.dmp

      Filesize

      504KB

    • memory/3012-1-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/3012-16-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/3024-25-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/3024-26-0x00000000002C0000-0x000000000032B000-memory.dmp

      Filesize

      428KB

    • memory/3024-24-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/3024-18-0x00000000001A0000-0x000000000021E000-memory.dmp

      Filesize

      504KB

    • memory/3024-43-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB