Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/01/2024, 11:04

General

  • Target

    7fae302f69ce6005438b2a98bb4dc6dc.exe

  • Size

    266KB

  • MD5

    7fae302f69ce6005438b2a98bb4dc6dc

  • SHA1

    e88cebcb5d2e4d65b11d5cec19803172ef041635

  • SHA256

    5e7e12cdf6bc129e2bb2ecf8cac3f15991b5450167f4a425fb9006f6fdd83d98

  • SHA512

    feb6c4bc0f05c11a31eae12cced6cbfaf08060b903abed76c7bf279e2ae7fe9406b84c451cce53fdc57ecf9e0844d4e4bb39d5deb6dce26209c35ebe536d8b98

  • SSDEEP

    6144:x99Wmom/YF7REiLw8dR90FkMyk05IbF9Bo+JCFQ:x99WT7R/hdRa371o+t

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7fae302f69ce6005438b2a98bb4dc6dc.exe
    "C:\Users\Admin\AppData\Local\Temp\7fae302f69ce6005438b2a98bb4dc6dc.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Users\Admin\AppData\Local\Temp\7fae302f69ce6005438b2a98bb4dc6dc.exe
      C:\Users\Admin\AppData\Local\Temp\7fae302f69ce6005438b2a98bb4dc6dc.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:3644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7fae302f69ce6005438b2a98bb4dc6dc.exe

    Filesize

    266KB

    MD5

    843612b5eae55a9c51027f027584b41e

    SHA1

    ef4217e7cbdcf0a9e810f3a96dd5e99758977e33

    SHA256

    ba954093479a1c380c6ab3d64c1ca6bb9c524adf6111adc9d6505fd6862061a1

    SHA512

    2d2ff85437472c05884e2b1833ec749c5664d1555f635ef6792c62d646725375fa24e5515e858adc88720d7b7a97593013be0d803e5082120bdd35f6f5adc4e9

  • memory/2188-0-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2188-1-0x00000000000F0000-0x0000000000111000-memory.dmp

    Filesize

    132KB

  • memory/2188-13-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2188-2-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3644-16-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3644-15-0x00000000001C0000-0x00000000001E1000-memory.dmp

    Filesize

    132KB

  • memory/3644-14-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/3644-30-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB