Analysis

  • max time kernel
    138s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    14/02/2024, 11:16

General

  • Target

    9b87cc47c62f53a7973942c6d46c2c8b.exe

  • Size

    2.0MB

  • MD5

    9b87cc47c62f53a7973942c6d46c2c8b

  • SHA1

    32c21f9093b58d7b440b63df075fe283138c269a

  • SHA256

    fcfb378f38151acc5a11acb99ab6af5f2028559cf25f3c737f76714a0fc3ef04

  • SHA512

    29a27ef04466b35010cb9cc9a74dc2bcc91f2f76c24815dc2e8bea6595dedaf8d866e462ca0484f40f7cdef091e870bd741a7e5fc39e003451f546d8c535febe

  • SSDEEP

    49152:poi42gXohaaj0GQ7ai7D3xTgOxYwpK9QPJex64ynRAIuGQ7ai7D3xTgOxYwpK:poiTgXsaaj0D2i7D3xkOxYwpK9CQx64u

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9b87cc47c62f53a7973942c6d46c2c8b.exe
    "C:\Users\Admin\AppData\Local\Temp\9b87cc47c62f53a7973942c6d46c2c8b.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2856
    • C:\Users\Admin\AppData\Local\Temp\9b87cc47c62f53a7973942c6d46c2c8b.exe
      C:\Users\Admin\AppData\Local\Temp\9b87cc47c62f53a7973942c6d46c2c8b.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:3040
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\9b87cc47c62f53a7973942c6d46c2c8b.exe" /TN qm2lmOfce5f6 /F
        3⤵
        • Creates scheduled task(s)
        PID:2684
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN qm2lmOfce5f6 > C:\Users\Admin\AppData\Local\Temp\FgBts.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2612
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN qm2lmOfce5f6
          4⤵
            PID:2584

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\FgBts.xml

      Filesize

      1KB

      MD5

      1911130ef5bb17802d771784131e5e7b

      SHA1

      bd6da6a18b7da04c67f8894f23ab6d93f88d38e3

      SHA256

      fc8a630191745515339150743d0a43646287606e9a3b8e729b093216af48f124

      SHA512

      1fb1eb4781b5062d2eec5c5499e4f4c6677840050ad3b5383006e48b507426333925e62955dfe48a8480f5c8dc4dd61915a21beca39dea3e2e5fe9c7b1dd85f7

    • \Users\Admin\AppData\Local\Temp\9b87cc47c62f53a7973942c6d46c2c8b.exe

      Filesize

      2.0MB

      MD5

      84688793ab46fc1a08ecd5941238b8bf

      SHA1

      dca97b6263251d96df4664f7e804f694ddf82456

      SHA256

      d2bc41403d5bdc0d6846892cf0c7d969bbf6445bed8739cde682eeaa2026c6ba

      SHA512

      1f8796c1d0dbba6c5cd512aec9701b40294720cb13311cd142704a3d6ea43e559bdb386662251c21551fadf8bb0f96d7d74ef34d9100e5c0d13b7a99dc9677ab

    • memory/2856-1-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/2856-3-0x0000000001660000-0x00000000016DE000-memory.dmp

      Filesize

      504KB

    • memory/2856-0-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2856-16-0x00000000232F0000-0x000000002354C000-memory.dmp

      Filesize

      2.4MB

    • memory/2856-15-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/3040-19-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/3040-21-0x0000000000330000-0x00000000003AE000-memory.dmp

      Filesize

      504KB

    • memory/3040-26-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/3040-31-0x0000000000470000-0x00000000004DB000-memory.dmp

      Filesize

      428KB

    • memory/3040-44-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB