Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    24/02/2024, 13:57

General

  • Target

    a2057f37f62f34e875b2a9faee83bd5c.exe

  • Size

    1.3MB

  • MD5

    a2057f37f62f34e875b2a9faee83bd5c

  • SHA1

    bf87558c6d424f03b1eeb8b4bc94045cb20aa085

  • SHA256

    0efe2e322060ba8ba39e7e41ef943842944f74c897cd3c98dfb83d81a5cbf276

  • SHA512

    4a0cc089fd455ee6142b316d3a3ac8f968aa2706aa6604ac4079ff1d1138125d852e85066994b413cf67f1956ba743160e0cb37c1c15b0b27dc828b091a8bd4a

  • SSDEEP

    24576:xnDaUJDe3bBBXsm14atroB9EZsdfHcpewlp01RQoDCEG4JvG:xnbDWbB1smStTEiipeO0duEG

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2057f37f62f34e875b2a9faee83bd5c.exe
    "C:\Users\Admin\AppData\Local\Temp\a2057f37f62f34e875b2a9faee83bd5c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Users\Admin\AppData\Local\Temp\a2057f37f62f34e875b2a9faee83bd5c.exe
      C:\Users\Admin\AppData\Local\Temp\a2057f37f62f34e875b2a9faee83bd5c.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2604

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\a2057f37f62f34e875b2a9faee83bd5c.exe

    Filesize

    1.3MB

    MD5

    b26111f3cc8578ecbfafbd50c462b544

    SHA1

    d2a79c79f1adb7bbbb88d4aa88110eb3ed8a5b2c

    SHA256

    336a1e49ce80da97476417df25ef212955a32b791ab7eb26bbe7c92b77a11695

    SHA512

    086f1698d641dca00aa4a57f166637ae902dd1b29f5a884ab8c048041161c439848e3f73fb7617c002df16e897b16735c2d62ed7a65c978143e32699977e172c

  • memory/2068-0-0x0000000000400000-0x000000000086A000-memory.dmp

    Filesize

    4.4MB

  • memory/2068-2-0x0000000000130000-0x0000000000242000-memory.dmp

    Filesize

    1.1MB

  • memory/2068-1-0x0000000000400000-0x00000000005F2000-memory.dmp

    Filesize

    1.9MB

  • memory/2068-15-0x00000000035B0000-0x0000000003A1A000-memory.dmp

    Filesize

    4.4MB

  • memory/2068-14-0x0000000000400000-0x00000000005F2000-memory.dmp

    Filesize

    1.9MB

  • memory/2068-26-0x00000000035B0000-0x0000000003A1A000-memory.dmp

    Filesize

    4.4MB

  • memory/2604-18-0x0000000000400000-0x000000000086A000-memory.dmp

    Filesize

    4.4MB

  • memory/2604-17-0x0000000000400000-0x00000000005F2000-memory.dmp

    Filesize

    1.9MB

  • memory/2604-20-0x0000000001A60000-0x0000000001B72000-memory.dmp

    Filesize

    1.1MB

  • memory/2604-27-0x0000000000400000-0x000000000086A000-memory.dmp

    Filesize

    4.4MB