Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    03/02/2024, 03:40

General

  • Target

    8b4d99198a3de7105578b5de8771cb2a.exe

  • Size

    3.9MB

  • MD5

    8b4d99198a3de7105578b5de8771cb2a

  • SHA1

    04c0aebe2dc42db920d1ee770ad79dfe8ed1a31e

  • SHA256

    8ca53c7166637a87d13e221c85f26642a35b36baf336a3a900453bae20827d2e

  • SHA512

    6a39ccba90850ea86cecbce7a5637ddd8bfb3def1d9c2b1d6682ffc5638b847ed3de969eaa3d28b19d7db2dfa9ec61b842e961c63b8e7b3c05e3d9b496b21a65

  • SSDEEP

    98304:mg/vEq2bfA9zyULG+Y0v0jD+rEA9zyULG+WRziQf4A9zyULG+Y0v0jD+rEA9zyU1:mg/eIzLqlGzLq4qzLqlGzLq

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b4d99198a3de7105578b5de8771cb2a.exe
    "C:\Users\Admin\AppData\Local\Temp\8b4d99198a3de7105578b5de8771cb2a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Users\Admin\AppData\Local\Temp\8b4d99198a3de7105578b5de8771cb2a.exe
      C:\Users\Admin\AppData\Local\Temp\8b4d99198a3de7105578b5de8771cb2a.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2668
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\8b4d99198a3de7105578b5de8771cb2a.exe" /TN U5Z8sQiHf24d /F
        3⤵
        • Creates scheduled task(s)
        PID:2816
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN U5Z8sQiHf24d > C:\Users\Admin\AppData\Local\Temp\3gQyjI.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2784
  • C:\Windows\SysWOW64\schtasks.exe
    schtasks.exe /Query /XML /TN U5Z8sQiHf24d
    1⤵
      PID:2868

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\3gQyjI.xml

            Filesize

            1KB

            MD5

            5749c2efff9737983ea207c47ce40199

            SHA1

            8d0129b926b256696c1116b3e542745606d41401

            SHA256

            be6c88014d0fe656f23042f7c546bc1a5d7c4d35ddc68956a98e2fe886f0f836

            SHA512

            6ee77cdf1e955584af48f2472b2b82cd217aa8b1f72e7ea34e7887e85293831c1a896dd3bc05a36a962bfe474512a3cc10c8e4844ff42d40f94fe6915297ceaa

          • C:\Users\Admin\AppData\Local\Temp\8b4d99198a3de7105578b5de8771cb2a.exe

            Filesize

            1.1MB

            MD5

            9c6623e0c80e1f607fc7c79409c7b380

            SHA1

            b051d4c09a0bf65eb1448aaf42e9ee384d63c356

            SHA256

            63f882b714a23c55236b0ab9405fd21a26de54c0f82ba85f7d1435ffa035da6b

            SHA512

            97f5f6208e96580f05afe7ee6fcfef206e1061b55002cd6da141d5b635f46780d3a8cd6aa585783a27de48430f1d6cb07a555531bd37a85c1d75fb7ade6790f4

          • \Users\Admin\AppData\Local\Temp\8b4d99198a3de7105578b5de8771cb2a.exe

            Filesize

            2.4MB

            MD5

            330dac2d10a5d11d92195f1c28da832c

            SHA1

            b049a318d40cb7b552c3bee147a450d74279a85e

            SHA256

            946bd1ab7f2ef374cd270977b3f7b58a9204ecf658a6264e5ccc185cbdae4a19

            SHA512

            bafc2083a54f89b7727758396af622f9de4fdbca50afb509d2f08e1ed29f19a189f64f27c074616114bc3258e5d78983c0620e97a93d7df8928c78c32e81d387

          • memory/1696-17-0x0000000023590000-0x00000000237EC000-memory.dmp

            Filesize

            2.4MB

          • memory/1696-5-0x0000000000400000-0x000000000065C000-memory.dmp

            Filesize

            2.4MB

          • memory/1696-0-0x0000000000400000-0x000000000065C000-memory.dmp

            Filesize

            2.4MB

          • memory/1696-1-0x0000000000400000-0x000000000046B000-memory.dmp

            Filesize

            428KB

          • memory/1696-16-0x0000000000400000-0x000000000046B000-memory.dmp

            Filesize

            428KB

          • memory/1696-3-0x0000000000320000-0x000000000039E000-memory.dmp

            Filesize

            504KB

          • memory/2668-21-0x0000000000400000-0x000000000065C000-memory.dmp

            Filesize

            2.4MB

          • memory/2668-22-0x0000000022D90000-0x0000000022E0E000-memory.dmp

            Filesize

            504KB

          • memory/2668-27-0x0000000000400000-0x000000000045B000-memory.dmp

            Filesize

            364KB

          • memory/2668-32-0x0000000000390000-0x00000000003FB000-memory.dmp

            Filesize

            428KB

          • memory/2668-55-0x0000000000400000-0x000000000065C000-memory.dmp

            Filesize

            2.4MB