Analysis

  • max time kernel
    142s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/01/2024, 04:48

General

  • Target

    7c31ba87e5d61f452c6b19084232eca2.exe

  • Size

    7.8MB

  • MD5

    7c31ba87e5d61f452c6b19084232eca2

  • SHA1

    cc7cfc939989cd0127348bd27bda51538a096b86

  • SHA256

    d74aa33a55647e7e0a120b33e6737e7f1360798b2f30dd4028c919d3060d88bd

  • SHA512

    8b49093ce61b516142b62981d44ce6a375dd6908a912d89a99bad5bcf81643d6d58b5dbd3c59fe1dfd881b3a90985f55523bc75f60ad43259e9afc289ec1a02c

  • SSDEEP

    196608:PVvRdlirybMgOnkdlirrvCLdlirybMgOnkdlirLzLMH4dlirybMgOnkdlirrvCLI:NBbMrnebMrnvMKbMrnebMrn

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Program crash 18 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c31ba87e5d61f452c6b19084232eca2.exe
    "C:\Users\Admin\AppData\Local\Temp\7c31ba87e5d61f452c6b19084232eca2.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1160
    • C:\Users\Admin\AppData\Local\Temp\7c31ba87e5d61f452c6b19084232eca2.exe
      C:\Users\Admin\AppData\Local\Temp\7c31ba87e5d61f452c6b19084232eca2.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:1016
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\7c31ba87e5d61f452c6b19084232eca2.exe" /TN EftJtVnu5bdb /F
        3⤵
        • Creates scheduled task(s)
        PID:2064
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN EftJtVnu5bdb > C:\Users\Admin\AppData\Local\Temp\RY475OQdi.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1252
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN EftJtVnu5bdb
          4⤵
            PID:2288
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 620
          3⤵
          • Program crash
          PID:4708
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 664
          3⤵
          • Program crash
          PID:1240
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 740
          3⤵
          • Program crash
          PID:3228
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 764
          3⤵
          • Program crash
          PID:1600
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 764
          3⤵
          • Program crash
          PID:932
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 828
          3⤵
          • Program crash
          PID:2972
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 1460
          3⤵
          • Program crash
          PID:1280
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 1876
          3⤵
          • Program crash
          PID:1812
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 2144
          3⤵
          • Program crash
          PID:4448
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 1920
          3⤵
          • Program crash
          PID:3944
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 2132
          3⤵
          • Program crash
          PID:4732
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 1876
          3⤵
          • Program crash
          PID:1248
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 1980
          3⤵
          • Program crash
          PID:1900
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 1928
          3⤵
          • Program crash
          PID:1256
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 1964
          3⤵
          • Program crash
          PID:3160
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 2132
          3⤵
          • Program crash
          PID:2060
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 2156
          3⤵
          • Program crash
          PID:4724
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 756
          3⤵
          • Program crash
          PID:1972
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1016 -ip 1016
      1⤵
        PID:844
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1016 -ip 1016
        1⤵
          PID:1272
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1016 -ip 1016
          1⤵
            PID:2272
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1016 -ip 1016
            1⤵
              PID:4728
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1016 -ip 1016
              1⤵
                PID:1568
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1016 -ip 1016
                1⤵
                  PID:4404
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1016 -ip 1016
                  1⤵
                    PID:1448
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1016 -ip 1016
                    1⤵
                      PID:520
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1016 -ip 1016
                      1⤵
                        PID:1760
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1016 -ip 1016
                        1⤵
                          PID:3500
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 1016 -ip 1016
                          1⤵
                            PID:1772
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1016 -ip 1016
                            1⤵
                              PID:412
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1016 -ip 1016
                              1⤵
                                PID:2564
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1016 -ip 1016
                                1⤵
                                  PID:3752
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1016 -ip 1016
                                  1⤵
                                    PID:1796
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1016 -ip 1016
                                    1⤵
                                      PID:3728
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1016 -ip 1016
                                      1⤵
                                        PID:3012
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 1016 -ip 1016
                                        1⤵
                                          PID:4308

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\Local\Temp\7c31ba87e5d61f452c6b19084232eca2.exe

                                          Filesize

                                          7.8MB

                                          MD5

                                          704bccbdf2d7fade3d274ae570209038

                                          SHA1

                                          cef396e7c54450554df53935d41dd893ce850e60

                                          SHA256

                                          ab1626448260fe5010d08cc922c264d9a0ec8c848731ce0e75db9415cc2d7a35

                                          SHA512

                                          9ac245874c1df1fbb4154be9f96f6b7a5a1d62f7ae34fbe90f8f6082ee6ad962482bc4c990859b94a0bf97686b61c9051dec488d00501791f02f187b098ad799

                                        • C:\Users\Admin\AppData\Local\Temp\RY475OQdi.xml

                                          Filesize

                                          1KB

                                          MD5

                                          a8fc9049c33e235bae84f89f313af3c1

                                          SHA1

                                          1f764f1862f40a5d4eaebb2e7db32811230689cc

                                          SHA256

                                          b32229f085a4f26d7d1ba9e57e2cbb88e22eed19564f2f379bce312b5faab108

                                          SHA512

                                          ce5f00dc73e227c969b83dde0759a5765de1df4da860a4937078dc02fd01dbbc686af906e5d13ccc31564ec63d83eb4431de9c2f4b379d771a24fe0ccd1ecdf3

                                        • memory/1016-18-0x0000000000400000-0x000000000065C000-memory.dmp

                                          Filesize

                                          2.4MB

                                        • memory/1016-15-0x0000000024000000-0x000000002407E000-memory.dmp

                                          Filesize

                                          504KB

                                        • memory/1016-22-0x00000000004B0000-0x000000000051B000-memory.dmp

                                          Filesize

                                          428KB

                                        • memory/1016-23-0x0000000000400000-0x000000000045B000-memory.dmp

                                          Filesize

                                          364KB

                                        • memory/1016-40-0x0000000000400000-0x000000000065C000-memory.dmp

                                          Filesize

                                          2.4MB

                                        • memory/1160-0-0x0000000000400000-0x000000000065C000-memory.dmp

                                          Filesize

                                          2.4MB

                                        • memory/1160-1-0x0000000000400000-0x000000000046B000-memory.dmp

                                          Filesize

                                          428KB

                                        • memory/1160-4-0x0000000001730000-0x00000000017AE000-memory.dmp

                                          Filesize

                                          504KB

                                        • memory/1160-13-0x0000000000400000-0x000000000046B000-memory.dmp

                                          Filesize

                                          428KB