Analysis

  • max time kernel
    139s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29-02-2024 09:45

General

  • Target

    ae34b52a1f6ba030ff9f59f15ab45ec1.exe

  • Size

    133KB

  • MD5

    ae34b52a1f6ba030ff9f59f15ab45ec1

  • SHA1

    4d2e83599591f5aa128a3bf1d54d227fda4c91e3

  • SHA256

    6be77c59b90202f980676e9b3ada836e213b2b79de5abad50a8698707e99a83a

  • SHA512

    e7ed26fcd6e6f76d3c71adef90c60b74800f3e8fc96ebbb791bc1a67cb18b773f2f5c58df935f59cfc93b88d3db714af4b3dcaa057a25338f7893f29ee12b84a

  • SSDEEP

    3072:wtXmWIa3GlAeBS86/U1+ef6Dnwie6hjEXbFKZw4fvDqJJ/X9z6h2gWQ:imWIIvQS86tef6DwtEFHW/56svQ

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae34b52a1f6ba030ff9f59f15ab45ec1.exe
    "C:\Users\Admin\AppData\Local\Temp\ae34b52a1f6ba030ff9f59f15ab45ec1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Users\Admin\AppData\Local\Temp\ae34b52a1f6ba030ff9f59f15ab45ec1.exe
      C:\Users\Admin\AppData\Local\Temp\ae34b52a1f6ba030ff9f59f15ab45ec1.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\ae34b52a1f6ba030ff9f59f15ab45ec1.exe

    Filesize

    133KB

    MD5

    f7b72d234c5f20e1f15382d7c4a5c837

    SHA1

    41dc36e98b255c395a00d2b4224deb1c96dcd2ab

    SHA256

    ff17f3dd0eae05391c2a4425883d818219c5e9a17e9eb28121a489dab5e2d1f8

    SHA512

    ddc892d29775314d7c84694a577cc5688cd0b0584b1ee5829318c044933f5f0c8da1b6f93f50921aa15269d4bfcb1571c150de7491bda32c3e74ba9fd511d719

  • memory/2692-18-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2692-20-0x00000000001E0000-0x0000000000201000-memory.dmp

    Filesize

    132KB

  • memory/2692-43-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/3048-0-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/3048-2-0x00000000002F0000-0x0000000000311000-memory.dmp

    Filesize

    132KB

  • memory/3048-1-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3048-15-0x0000000000320000-0x00000000003A6000-memory.dmp

    Filesize

    536KB

  • memory/3048-14-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3048-42-0x0000000000320000-0x00000000003A6000-memory.dmp

    Filesize

    536KB