Analysis

  • max time kernel
    141s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    29/01/2024, 16:52

General

  • Target

    805caf95b5565ba347747691f7d2106b.exe

  • Size

    133KB

  • MD5

    805caf95b5565ba347747691f7d2106b

  • SHA1

    850f720e556cd2af743061bb52645d01dc93e016

  • SHA256

    4d30a37a2e02d5b2582b6dbbe4ae002e01fc35afc4cc230d7178def366ca77d4

  • SHA512

    77e0dd62dc422059e62e0c99e3d0151da47538bf7cb79cfd48cba0b3e0608b44bde83390b75acdb532c95f6b66dfb6b72a546c8448f2926d826bee786aa0a119

  • SSDEEP

    3072:S3avhXad4YCSU4Toiz8ZhHYCwywEKlpL6nu+5s43+eR0toQ:SEMSiwZVYCwSKlsuAN+oQ

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\805caf95b5565ba347747691f7d2106b.exe
    "C:\Users\Admin\AppData\Local\Temp\805caf95b5565ba347747691f7d2106b.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1404
    • C:\Users\Admin\AppData\Local\Temp\805caf95b5565ba347747691f7d2106b.exe
      C:\Users\Admin\AppData\Local\Temp\805caf95b5565ba347747691f7d2106b.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\805caf95b5565ba347747691f7d2106b.exe

    Filesize

    133KB

    MD5

    8e2d680390b77880a80bd2f25e226249

    SHA1

    e0ff6addb9ee52a9e056d0dac8ec577431f4605e

    SHA256

    b48eb904140c7e5864bbca98212d626b4f8344be7256c2be8c819cc003d2c590

    SHA512

    645fcbabb7ab47e01815eebaa39837c249c7cf7d3e0ef0fd60ab5e7370f6f388d1adaee2b88a19abd42563b7df8238459e6f2ad417ff0705d3001f9c205a3599

  • memory/1404-0-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/1404-1-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1404-7-0x0000000000150000-0x0000000000171000-memory.dmp

    Filesize

    132KB

  • memory/1404-15-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1404-14-0x0000000002CB0000-0x0000000002D36000-memory.dmp

    Filesize

    536KB

  • memory/1404-33-0x0000000002CB0000-0x0000000002D36000-memory.dmp

    Filesize

    536KB

  • memory/2064-19-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2064-20-0x0000000000150000-0x0000000000171000-memory.dmp

    Filesize

    132KB

  • memory/2064-34-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB