Analysis

  • max time kernel
    139s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24/02/2024, 07:21

General

  • Target

    a145b92e958e208948a122e674ad2148.exe

  • Size

    5.0MB

  • MD5

    a145b92e958e208948a122e674ad2148

  • SHA1

    6a53bd3a42cedaab4fe35b532309e2a7566fdefb

  • SHA256

    f74bca0380d52ce1d872de5880de3a569c486ee7032fda93804e99277b73d387

  • SHA512

    8158373c1c3659fa5e79d3f69be34cee4e67ac0b5b75bd94a33cee240729eea30cd80ddf5f44290a20d7e66bd071e2b07cc9ca2eb10d179df0d93e57764c815e

  • SSDEEP

    49152:XvItnr32K/ukk/gr5QiqfOELdQoaJW/OOkgWxTgT5XZAdd:/inr32KG/E5QmEL+oaIGy0E5Wd

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a145b92e958e208948a122e674ad2148.exe
    "C:\Users\Admin\AppData\Local\Temp\a145b92e958e208948a122e674ad2148.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2820
    • C:\Users\Admin\AppData\Local\Temp\a145b92e958e208948a122e674ad2148.exe
      C:\Users\Admin\AppData\Local\Temp\a145b92e958e208948a122e674ad2148.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\a145b92e958e208948a122e674ad2148.exe

    Filesize

    388KB

    MD5

    29188281bf26254fc8a98e3976e2e42a

    SHA1

    c63f0e00a442cf6eb306a043c9b1d8429efde93f

    SHA256

    0d13b64cae196808982c26744100c895229aaa76757985c7289ebf35275abac9

    SHA512

    e66bc4ddd8c2916e81f01798b8173388fbb39789e7d851a12a3bf3372a6131f7f41a05899762f4b57d4807ea4e11c2e7647ab25b710506471c6b9f83f8afaee6

  • \Users\Admin\AppData\Local\Temp\a145b92e958e208948a122e674ad2148.exe

    Filesize

    496KB

    MD5

    66989c75a7ef9171639f582ca7cd9d75

    SHA1

    3f029fae11ef42f9523df8b429cf08878bfe157e

    SHA256

    dc73166ccffa2dc1ff1f1e23a313785a3bec78720425d68f92429c5929099558

    SHA512

    331683a4c9157ed24d87c19aa48f4def8490bf2a7497fc21dbd0625c98cc769c5ff9a66b2adfe928fcc7230702a6a14bf1f150cdd939851f6e104f2d837ab459

  • memory/2080-20-0x0000000000400000-0x0000000000CE1000-memory.dmp

    Filesize

    8.9MB

  • memory/2080-22-0x0000000001EE0000-0x000000000210E000-memory.dmp

    Filesize

    2.2MB

  • memory/2080-44-0x0000000000400000-0x0000000000CE1000-memory.dmp

    Filesize

    8.9MB

  • memory/2820-0-0x0000000000400000-0x0000000000CE1000-memory.dmp

    Filesize

    8.9MB

  • memory/2820-1-0x0000000000400000-0x00000000005EF000-memory.dmp

    Filesize

    1.9MB

  • memory/2820-3-0x0000000002120000-0x000000000234E000-memory.dmp

    Filesize

    2.2MB

  • memory/2820-17-0x0000000003C60000-0x0000000004541000-memory.dmp

    Filesize

    8.9MB

  • memory/2820-15-0x0000000000400000-0x00000000005EF000-memory.dmp

    Filesize

    1.9MB

  • memory/2820-43-0x0000000003C60000-0x0000000004541000-memory.dmp

    Filesize

    8.9MB