Analysis

  • max time kernel
    141s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01-02-2024 22:41

General

  • Target

    87da907861baa9cd40eb52399c83af2b.exe

  • Size

    3.9MB

  • MD5

    87da907861baa9cd40eb52399c83af2b

  • SHA1

    a7b5129b36afd2054943906ad0bdc172456ad946

  • SHA256

    c4cd09f6e9ca998e036fb941311c4bfff830417a5ed41bed11b2701c10d0c805

  • SHA512

    5edca0c8d00d4124d3994868d66709e6002d1dc16cac5166cb7d5eb2a7e4e9cd6be43603d91aa1e03ec5e94063a654d79cf277b1f0200abe5df0818c2a53fea2

  • SSDEEP

    98304:xQX3r3MTAmHHA9zyULG+ZIDLWY9QA9zyULG+H5ZECD5RqqLY8A9zyULG+ZIDLWYt:q3r3M3gzLqvqY/zLqAe0RTLYZzLqvqYy

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\87da907861baa9cd40eb52399c83af2b.exe
    "C:\Users\Admin\AppData\Local\Temp\87da907861baa9cd40eb52399c83af2b.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2428
    • C:\Users\Admin\AppData\Local\Temp\87da907861baa9cd40eb52399c83af2b.exe
      C:\Users\Admin\AppData\Local\Temp\87da907861baa9cd40eb52399c83af2b.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2356
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\87da907861baa9cd40eb52399c83af2b.exe" /TN x1iLRz9v069a /F
        3⤵
        • Creates scheduled task(s)
        PID:2696
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN x1iLRz9v069a > C:\Users\Admin\AppData\Local\Temp\WP1qLoC.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2964
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN x1iLRz9v069a
          4⤵
            PID:2104

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\87da907861baa9cd40eb52399c83af2b.exe

      Filesize

      3.9MB

      MD5

      360ed0c2b57038de7ffaecfd56c9a796

      SHA1

      7fb75c579cebee1f35cb95cb703a3e058a467343

      SHA256

      464604c386868771955960e218a24d30f71825402707c88bfd876ccae9c2b717

      SHA512

      7035fb8bcbc82d7fc26333ccf118914a9027c48135d28d36c5ac7320af860c09c06e23458d2075e281e55c3b4a54ee0094f57e26f017863ee00d861b1221e801

    • C:\Users\Admin\AppData\Local\Temp\WP1qLoC.xml

      Filesize

      1KB

      MD5

      2ef3df9b6158e6e3db418af87bf7bb2b

      SHA1

      52277eb17dc43a1287358a81f8a67bcbc0029c76

      SHA256

      ec2ec48137f6b7ae57c1d9340966e5987bc05fbc960a02d2e7240bfd5162e5f3

      SHA512

      715b1a98febb6a59fb02a9844d0473119e16d7cf9ac0e13ac76a0457a445098fbb4d95a81fedeb69d53fd3cc93bf8f2c9b2d03ec7331f41df5eab085544fb7a8

    • \Users\Admin\AppData\Local\Temp\87da907861baa9cd40eb52399c83af2b.exe

      Filesize

      3.3MB

      MD5

      5165f03fa59eab4e49028a6a2ef307d9

      SHA1

      5300148b1ce70586882596aa5d2e7dfcf220f33c

      SHA256

      c4623d7e7fc4d84358c115a5096fd2df4044ae60f92879e26da1551208e28f55

      SHA512

      9d891aaa767acea2019afc12e501d47f6a4f0d9e56df9a196b9f6335c56b3ad03c1716946d0b95dc76ca992fdc8ced9a6abb6c0f9be8da473276bced3c819e4a

    • memory/2356-19-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2356-21-0x0000000001660000-0x00000000016DE000-memory.dmp

      Filesize

      504KB

    • memory/2356-26-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/2356-31-0x0000000000470000-0x00000000004DB000-memory.dmp

      Filesize

      428KB

    • memory/2356-54-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2428-0-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2428-16-0x00000000235A0000-0x00000000237FC000-memory.dmp

      Filesize

      2.4MB

    • memory/2428-15-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/2428-1-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/2428-2-0x0000000000370000-0x00000000003EE000-memory.dmp

      Filesize

      504KB