Analysis

  • max time kernel
    119s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29/02/2024, 07:57

General

  • Target

    ae12a461569d64d459bbdd44644cfbf0.exe

  • Size

    133KB

  • MD5

    ae12a461569d64d459bbdd44644cfbf0

  • SHA1

    ef28d1eaae1d818674e67fb1ea07fdfcc559c17a

  • SHA256

    e9df889e5ed6a750ffd82d46fc6943ef63c934da7b4ea7a215835fc2110c7517

  • SHA512

    84e69d4ba215bcf10fe10fabca3c0ee4872502364b75344b887b1c3c053451f552a2a1af7e8e2b9604afbb5a26e65687b0303bf9460911f389354439a46cd36f

  • SSDEEP

    3072:qDL+nep4VIFD9fQk3VvuOpTqNEdVrAoTM2fOjfffsdhLu67zQ:q3+uJFxom0OpljTMjv0dx7zQ

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae12a461569d64d459bbdd44644cfbf0.exe
    "C:\Users\Admin\AppData\Local\Temp\ae12a461569d64d459bbdd44644cfbf0.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Users\Admin\AppData\Local\Temp\ae12a461569d64d459bbdd44644cfbf0.exe
      C:\Users\Admin\AppData\Local\Temp\ae12a461569d64d459bbdd44644cfbf0.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2540

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\ae12a461569d64d459bbdd44644cfbf0.exe

          Filesize

          133KB

          MD5

          da821f4bd3541b463f8e67eaa08fdffe

          SHA1

          ec698080a366b237580bc4b66e8e70826f9c9a9b

          SHA256

          d0fd14a00d2237d20c131777f0ff152e9b18c52ffe8c7dc34d37217055aed7c0

          SHA512

          a299d1395cdbdb91838dcbe88a410618e3c4d4dfe6d4a4c94002a67c4b424154b4dab2ebcffa0031c7df24d01c3b56f150c0f9e97f250747a8c6e8e181989cfd

        • memory/2540-17-0x0000000000400000-0x0000000000486000-memory.dmp

          Filesize

          536KB

        • memory/2540-20-0x00000000001D0000-0x00000000001F1000-memory.dmp

          Filesize

          132KB

        • memory/2540-42-0x0000000000400000-0x0000000000486000-memory.dmp

          Filesize

          536KB

        • memory/2696-0-0x0000000000400000-0x0000000000486000-memory.dmp

          Filesize

          536KB

        • memory/2696-1-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2696-3-0x00000000000E0000-0x0000000000101000-memory.dmp

          Filesize

          132KB

        • memory/2696-15-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2696-14-0x0000000002CB0000-0x0000000002D36000-memory.dmp

          Filesize

          536KB