Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07/03/2024, 23:09

General

  • Target

    a7fa307e6dd0caebb0081e8cf8bdd0beb65191f3ed801ebfbfeab9e27d3b0c78.exe

  • Size

    111KB

  • MD5

    15d42003e4e92d75bfef96cfe62cf134

  • SHA1

    93b7cf9a302f18b78ecf6c2eba93ded9727a492c

  • SHA256

    a7fa307e6dd0caebb0081e8cf8bdd0beb65191f3ed801ebfbfeab9e27d3b0c78

  • SHA512

    2fb33d3452a6514426f986bb9f1ff0f3ac6273f9184e0c3554a062b3b4bcd3de6203616a9a67c7cae2208080ce385f2c40491451017e4c9c385aef58e3111f87

  • SSDEEP

    1536:ELNIW39SaZTbFARlq7jC1OZstZu0TSVEdUJWTWd18f4:ELlbZTZX3BAtTSVEdUJWTWd18f4

Score
9/10

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 6 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a7fa307e6dd0caebb0081e8cf8bdd0beb65191f3ed801ebfbfeab9e27d3b0c78.exe
    "C:\Users\Admin\AppData\Local\Temp\a7fa307e6dd0caebb0081e8cf8bdd0beb65191f3ed801ebfbfeab9e27d3b0c78.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\ProgramData\Graphics\guifx.exe
      "C:\ProgramData\Graphics\guifx.exe" /run
      2⤵
      • Executes dropped EXE
      PID:2336
    • C:\windows\SysWOW64\cmd.exe
      "C:\windows\system32\cmd.exe" /c del /q "C:\Users\Admin\AppData\Local\Temp\a7fa307e6dd0caebb0081e8cf8bdd0beb65191f3ed801ebfbfeab9e27d3b0c78.exe" >> NUL
      2⤵
      • Deletes itself
      PID:2516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \ProgramData\Graphics\guifx.exe

    Filesize

    111KB

    MD5

    530a13a14a55b37a4360c5fdd12156b6

    SHA1

    52bca2058257b7135315b911a51b4de8761ff7b3

    SHA256

    93860e3600448b0c6dfc492a85134bb098d09e457551cc75c197af804c1eb813

    SHA512

    4fa4d34142125931d475254ae5d89671b1b8c28cf4b63d4b2a5fde936f9cb4102c20bb0070fdf7c93b3da8620cb764b1a00e4072725d8fdfba66b3c957403fd7

  • memory/2036-0-0x0000000000F50000-0x0000000000F6C000-memory.dmp

    Filesize

    112KB

  • memory/2036-7-0x0000000000F50000-0x0000000000F6C000-memory.dmp

    Filesize

    112KB

  • memory/2036-8-0x0000000000BB0000-0x0000000000BCC000-memory.dmp

    Filesize

    112KB

  • memory/2036-10-0x0000000000F50000-0x0000000000F6C000-memory.dmp

    Filesize

    112KB

  • memory/2036-11-0x0000000000BB0000-0x0000000000BCC000-memory.dmp

    Filesize

    112KB

  • memory/2336-6-0x0000000000BB0000-0x0000000000BCC000-memory.dmp

    Filesize

    112KB

  • memory/2336-9-0x0000000000BB0000-0x0000000000BCC000-memory.dmp

    Filesize

    112KB