Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04/02/2024, 08:24

General

  • Target

    8eacfd200a007ca7a226cbb6a4a9f2da.exe

  • Size

    1.2MB

  • MD5

    8eacfd200a007ca7a226cbb6a4a9f2da

  • SHA1

    a5a72e7457bc65a27e497179c67a9974ed3ecdbf

  • SHA256

    39095e6a7f566a48a2e3c887f52d6d05521b4406ded9e5ed1e6a4cdd9fe4313d

  • SHA512

    cf3783ebfcb47e30351b38d0c797f8b8df0c7e5457301f21c62708281e0c89b9ce4bcefa1c976dceded097d7860b4413165014e927d0306c199021796aaeb153

  • SSDEEP

    24576:mqN3PyuQCjdQ5+uav4NVa3o1gs7tQCjdQ5+uav4NVa:mqNxQeC5+dsVafUQeC5+dsVa

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8eacfd200a007ca7a226cbb6a4a9f2da.exe
    "C:\Users\Admin\AppData\Local\Temp\8eacfd200a007ca7a226cbb6a4a9f2da.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2176
    • C:\Users\Admin\AppData\Local\Temp\8eacfd200a007ca7a226cbb6a4a9f2da.exe
      C:\Users\Admin\AppData\Local\Temp\8eacfd200a007ca7a226cbb6a4a9f2da.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2280

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\8eacfd200a007ca7a226cbb6a4a9f2da.exe

    Filesize

    770KB

    MD5

    f3371f4a3401fc8af247521332d66e52

    SHA1

    e3b4788748c3310cce02c022ae3e2f4307664644

    SHA256

    e4f07d8a9d4eb1e76f21ecb6c42af397d0dfd68e47427417f00ce9694d73e513

    SHA512

    79d9efaf22fa22ab2557134d1261820046638f66a43bf504946782b00751419da69aa67963993b94b3030e1a8c3a74cb8553ea7948ecb8c91d7041f8a720011f

  • \Users\Admin\AppData\Local\Temp\8eacfd200a007ca7a226cbb6a4a9f2da.exe

    Filesize

    1.1MB

    MD5

    9be371b37c835375f8eabe7f1df1514e

    SHA1

    2969e326ad721b5671d72d7272649976d8f4817e

    SHA256

    6e461690419194c40f075dff8422e87fc4a51576c0a8f79ded4805419e8ffc78

    SHA512

    4943b9ae081219c494eb5c74c1e4d8c4cc758c229cf3018e209a60f8687473cbb7c93158f2cd0563c2543789430f7413e1e9caa4f51ac496af4dbb958264b0b7

  • memory/2176-0-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/2176-2-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2176-1-0x0000000000160000-0x0000000000191000-memory.dmp

    Filesize

    196KB

  • memory/2176-15-0x0000000022E70000-0x0000000022F50000-memory.dmp

    Filesize

    896KB

  • memory/2176-16-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2280-19-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/2280-21-0x0000000000310000-0x0000000000341000-memory.dmp

    Filesize

    196KB

  • memory/2280-44-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB