Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    06/03/2024, 08:53

General

  • Target

    ExamSQL.exe

  • Size

    3.3MB

  • MD5

    cf4b196fd69bb1b88e8f595266f5ee4b

  • SHA1

    e32745ea62bd0e5a51b708ce3f6cca274aa972f2

  • SHA256

    1e46a731327705d3e91323c7aeb9397ca5a961edfe9049e1bab41c7cc2cdee05

  • SHA512

    ad3652095c29f91979c0bd684eb12971cdb27d41e8b4306d52252fe5d48124a14f2cccd519026c9e4c537342f518d4d142f215349b67b1ab05d4361dd557c306

  • SSDEEP

    98304:hPBaBfBABf3w11DYG1a+A37zyoB3lLRBanHAHnVw:rOpMvw1Tor3yoB5zangm

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ExamSQL.exe
    "C:\Users\Admin\AppData\Local\Temp\ExamSQL.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Users\Admin\AppData\Local\Temp\ae2146\setup.exe
      C:\Users\Admin\AppData\Local\Temp\ae2146\setup.exe -d "C:\Users\Admin\AppData\Local\Temp"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ae2146\Setup.ini

    Filesize

    34KB

    MD5

    121fd37caf8f1861f6056b137475fb72

    SHA1

    3318eb73e640183eb0d1cf59b56f3c835aed6797

    SHA256

    75213b5e8dab60ca964ac418547712fcca76a49cc774095ed2c5a051c834fc56

    SHA512

    27343c08b7adefde5672fb47736a95a307ecefd0fb6db219e1e2fa7304f87ca1d69f1d6df0aa1ccb1de885ca21499ad02b4e70095cc35857b8445ec5923a87d4

  • C:\Users\Admin\AppData\Local\Temp\ae2146\¼òÌåÖÐÎÄ.dat

    Filesize

    4KB

    MD5

    b02bab409baabb2f432a9deb588edc75

    SHA1

    485b21647b8037864e35e4fa6fb268ba50883fd5

    SHA256

    a00b95f9e9b0e3f7fb145eabd68be1688cab81adb399c23d8810ed0fc3e0293d

    SHA512

    484c86c43a3a2e978e150b12cbf7948492a60aee49eff581574b5845d31c58998066dac8332ffd38ce1106778405e0cbd6622c8bf06b7877fa7c0ca777a9f17c

  • \Users\Admin\AppData\Local\Temp\ae2146\setup.exe

    Filesize

    149KB

    MD5

    808e84852804a6a0a036edf798428f6c

    SHA1

    8b8923c86da2bd7fbe15bf8ec0178fa210b06e8e

    SHA256

    2208362d112c755d569a03e28282b30dd53ddd79fe44dcde6ecad23ea82b37b2

    SHA512

    9df79af8b7fd4945ffc58122063ba797b39a905f1665ce4c802a30bf8c721e1498296862fee0aa9291456aae0f6bc6634a5303ac22b336f927ba290c25b4ef6a

  • memory/1740-10-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/1740-14-0x0000000000870000-0x00000000008E1000-memory.dmp

    Filesize

    452KB

  • memory/1740-17-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2236-5-0x0000000002060000-0x00000000020D1000-memory.dmp

    Filesize

    452KB