Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27/02/2024, 21:11

General

  • Target

    aa2aa84f73200c8663580a68bc864341.exe

  • Size

    1.5MB

  • MD5

    aa2aa84f73200c8663580a68bc864341

  • SHA1

    2646091476e68932785a86d87994a28907adf8d8

  • SHA256

    c661da82a4811a0ccaaabdae793f96727eab1daa63b3b48ca3e25421bb1e0565

  • SHA512

    61b99bb1e2ccd0fb2d907c4dcacc07693905ff3903bc0f12f64d78f5be8ff2ba3b25e98c4a109b1f17bfc91ba6e68ad6c0b60d8f6e2c1a04cf77d20f6c735c60

  • SSDEEP

    24576:T3fso+91yO3hevwirSpcjukL2IIqQgdf7LB8C5Wf8MDBapcjukL2Y:Dfsz1ychcrWpcakLPIXgdfHBL5WEMDB7

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aa2aa84f73200c8663580a68bc864341.exe
    "C:\Users\Admin\AppData\Local\Temp\aa2aa84f73200c8663580a68bc864341.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2772
    • C:\Users\Admin\AppData\Local\Temp\aa2aa84f73200c8663580a68bc864341.exe
      C:\Users\Admin\AppData\Local\Temp\aa2aa84f73200c8663580a68bc864341.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:1876
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\aa2aa84f73200c8663580a68bc864341.exe" /TN MJu5Ub8Eff50 /F
        3⤵
        • Creates scheduled task(s)
        PID:2668
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN MJu5Ub8Eff50 > C:\Users\Admin\AppData\Local\Temp\cwVkvi.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1980
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN MJu5Ub8Eff50
          4⤵
            PID:1332

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\cwVkvi.xml

      Filesize

      1KB

      MD5

      3919a2db98b469a80839d964afc045ed

      SHA1

      fba64ed46edd8397700cc7567608b78f1e88e833

      SHA256

      204c74bcc7ff4d5f86e2f9d6a465a6da5a835b9c46042dbdeeff8890f41a29f4

      SHA512

      bc0aff6a8674d3967be309dc9022c4300c7797dfee730f3558f6e2b107c7afeb4a42ee1576cce79d83ebd48d8e67420fbb97b0a6a63721fa8fc4e311765425ed

    • \Users\Admin\AppData\Local\Temp\aa2aa84f73200c8663580a68bc864341.exe

      Filesize

      1.5MB

      MD5

      00a9f7206e72ad65149865fd5dbf76cc

      SHA1

      d45a87675fc71bb596b5ab473ace98b88be63b78

      SHA256

      fcd323a3b04dd6c028f3eec8ad24d27f6ad69b9e7edbb4e569046ffdf443d4b8

      SHA512

      6811f0726cbeb7721e57e9e4f927e78a53a16095ffe8f6968b465f9caa3549a8bb52011f7f1fdac1f69c809788e543f14833cc89199cd5eeb8e98a45ffcc8132

    • memory/1876-27-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/1876-21-0x0000000000270000-0x00000000002EE000-memory.dmp

      Filesize

      504KB

    • memory/1876-19-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/1876-28-0x00000000002F0000-0x000000000035B000-memory.dmp

      Filesize

      428KB

    • memory/1876-54-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2772-5-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2772-0-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2772-17-0x0000000023040000-0x000000002329C000-memory.dmp

      Filesize

      2.4MB

    • memory/2772-16-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/2772-1-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/2772-3-0x00000000001A0000-0x000000000021E000-memory.dmp

      Filesize

      504KB