Analysis

  • max time kernel
    139s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    03/02/2024, 04:09

General

  • Target

    8b5c2074ecba4918fbe687a876df516d.exe

  • Size

    10.2MB

  • MD5

    8b5c2074ecba4918fbe687a876df516d

  • SHA1

    fdc2324be1cc8dec8874390c3a7afcfd811be734

  • SHA256

    3d0dd9dfa43298f5dcc1aabf233b977d05b4ef4c25f7ed1c794986c29561fc19

  • SHA512

    761aee170fb957f4c4ba877d293d03769c8f29ff34e2a3e7ed4c27a995816ff27053f566c65c155f7cc43f4c15942cd6c1625c42363b6e27211af2256f48fdce

  • SSDEEP

    98304:01NywFVly3R6lWRcZa30g2yOEjjs9/g3AZrRMftTmYQJ30g2yOEjjs9/g3:0X1FPy4lWuZnZUju/FZrOt6XCZUju/

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b5c2074ecba4918fbe687a876df516d.exe
    "C:\Users\Admin\AppData\Local\Temp\8b5c2074ecba4918fbe687a876df516d.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2672
    • C:\Users\Admin\AppData\Local\Temp\8b5c2074ecba4918fbe687a876df516d.exe
      C:\Users\Admin\AppData\Local\Temp\8b5c2074ecba4918fbe687a876df516d.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\8b5c2074ecba4918fbe687a876df516d.exe

    Filesize

    1.4MB

    MD5

    abea0588c2232354615e8da7aeff2699

    SHA1

    a3bcd9ebee6665d65378a7857a0a99336c2de8c8

    SHA256

    be16a62ee4893979ce98729ed6fc0d6d41c30f3f9564590ca1e72c51fcb7367d

    SHA512

    0d61fca1dabb18fc1b5d4dab0fab7ab4b1021f75b283a77570842412681e6c701a453a23d8d278590240e6b019035193bfc4fc87be5e68d1329fbb836dc2e432

  • \Users\Admin\AppData\Local\Temp\8b5c2074ecba4918fbe687a876df516d.exe

    Filesize

    1.8MB

    MD5

    123255a160ef6311cecb8356c0daccfa

    SHA1

    858116d0f30df5eb3dd6f687273450c2559a14c6

    SHA256

    1b0ad6c4efe54412991da850a060d72f62f49157eb718006c6cdac2334121483

    SHA512

    5537d32990db82095e0708af9f90cab852a48394527c677c0898e16ea46baba76a870a5b2f5373fdeb527d7a7dad8e5e26472890e11415fbed41512116ed47df

  • memory/2672-0-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2672-1-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/2672-2-0x0000000001FA0000-0x00000000021FA000-memory.dmp

    Filesize

    2.4MB

  • memory/2672-15-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/2672-16-0x0000000004AA0000-0x000000000543E000-memory.dmp

    Filesize

    9.6MB

  • memory/2672-42-0x0000000004AA0000-0x000000000543E000-memory.dmp

    Filesize

    9.6MB

  • memory/2728-19-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2728-21-0x0000000001FA0000-0x00000000021FA000-memory.dmp

    Filesize

    2.4MB

  • memory/2728-43-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB