Analysis

  • max time kernel
    170s
  • max time network
    184s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01-02-2024 16:47

General

  • Target

    87649c1715af3d54b149a7aa8baec280.exe

  • Size

    11.0MB

  • MD5

    87649c1715af3d54b149a7aa8baec280

  • SHA1

    b9ba8c90112371e4d52f47662fc78978ce309b83

  • SHA256

    8057b51c5448320907bb6cbbe7b66c9bdc2538a845a07a0d1d48892e5a094186

  • SHA512

    cb8f53246a907cacdee07109bf3c25d03e5e176e62c5aa18775d928e424b6445c1c75f7bfe668e9eaa7171cd98be091cf6b4a0a4246e3bf188b52012434b5fce

  • SSDEEP

    98304:N7vJaDGICH3OtAz35mCckFR+vicS43OZBmTy7hw8pag35mCckFR+vicS43:N7MKIC+WN33FR+6cO++S433FR+6c

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\87649c1715af3d54b149a7aa8baec280.exe
    "C:\Users\Admin\AppData\Local\Temp\87649c1715af3d54b149a7aa8baec280.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1396
    • C:\Users\Admin\AppData\Local\Temp\87649c1715af3d54b149a7aa8baec280.exe
      C:\Users\Admin\AppData\Local\Temp\87649c1715af3d54b149a7aa8baec280.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\87649c1715af3d54b149a7aa8baec280.exe

    Filesize

    3.0MB

    MD5

    e1ed247111d6e7316d82e797b7d2ea42

    SHA1

    2a8ef25dc3ee3fa02fe25d7db980c3e5ae6e2e13

    SHA256

    4d7c324568fcb88f754f3c4bac4594969f7e6b0a5cadaf47f11ed9d86f03d428

    SHA512

    01290e71f2e691f5cd5470cdab0623f468eb60db804026096b3bde10d45efb5315f2cd6a241de3513f8b139d9ac9a5401dcbb5c17b7720478d322db45d265613

  • \Users\Admin\AppData\Local\Temp\87649c1715af3d54b149a7aa8baec280.exe

    Filesize

    3.1MB

    MD5

    ce77dc6f0f01e90067f8b8ce15c82d12

    SHA1

    d86f870b51b69b1e10877647a4efa1b5327218bf

    SHA256

    70d3b2cece5cdae65b20d91bac6200b11c07d84f08b4c4449fbc706c265b10a0

    SHA512

    8237f5c50daf8f926812ce09db2e9444bddc46025bd2494f32d3b6f736235864490d05f4efdcc06ea00acf6829671c2a81e7603e9cf843c6ac25d5f6a18bed8b

  • memory/1396-0-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/1396-1-0x0000000002210000-0x000000000246A000-memory.dmp

    Filesize

    2.4MB

  • memory/1396-2-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/1396-15-0x0000000004EB0000-0x000000000584E000-memory.dmp

    Filesize

    9.6MB

  • memory/1396-16-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/2952-19-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2952-21-0x0000000001FA0000-0x00000000021FA000-memory.dmp

    Filesize

    2.4MB

  • memory/2952-43-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB