Analysis

  • max time kernel
    94s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-02-2024 16:35

General

  • Target

    ac58974e59ee85c45c2753977547211f.exe

  • Size

    5.1MB

  • MD5

    ac58974e59ee85c45c2753977547211f

  • SHA1

    a93a1d5f7504cca7dac5e6cdec0c7385c02da316

  • SHA256

    bdaee93044a8b5c5407acd3173b9411a4e22c7307bd6b0616703a3584a8094a0

  • SHA512

    f67f25f56d68aceb7e4f4916830e22b35850b09650ca636327883e7156b5bda341fd8515f0eb7de63ec53516a74f0684ddd50f2dfd6b5043df5e413653796e3e

  • SSDEEP

    49152:/sbL2DNlMHjZo76O3ptUifrFlQ1sQIkGBMtit4TG3Xay35bkrfg8FYri+ts5EjdB:MGz76fiYNTC30g2yOEjjs9/g3

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac58974e59ee85c45c2753977547211f.exe
    "C:\Users\Admin\AppData\Local\Temp\ac58974e59ee85c45c2753977547211f.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2812
    • C:\Users\Admin\AppData\Local\Temp\ac58974e59ee85c45c2753977547211f.exe
      C:\Users\Admin\AppData\Local\Temp\ac58974e59ee85c45c2753977547211f.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2096

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ac58974e59ee85c45c2753977547211f.exe

    Filesize

    5.1MB

    MD5

    5a54673d32bdcced0bb2a4d975e19130

    SHA1

    fa46796d1cb20e213990863b19ff2051510bf76b

    SHA256

    bfe822bae1feee7f5c4fe6c0b0ff7c03d4ac8846813225d418e75b6b3b7c6f0a

    SHA512

    d1c74b7cc15743c61e537af56199eb33003de0b21e82136c57b05cc4231f3a0331859dc4a2cb11ec9923fc1467926d62a864a6dbba4d833dddb96fb4d83c78ef

  • memory/2096-15-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2096-18-0x00000000023F0000-0x000000000264A000-memory.dmp

    Filesize

    2.4MB

  • memory/2096-30-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2812-0-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2812-1-0x0000000002220000-0x000000000247A000-memory.dmp

    Filesize

    2.4MB

  • memory/2812-2-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/2812-13-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB