Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07/03/2024, 12:34

General

  • Target

    b8bd56fc9e4446768aff0ebd96403e1d.exe

  • Size

    133KB

  • MD5

    b8bd56fc9e4446768aff0ebd96403e1d

  • SHA1

    f3656de5bf1a9438a06b36e0c12a04267ed2c815

  • SHA256

    42b41f4a8501eb041afac4322697bef506f16a8ee02dda9fcb61745df927e4d0

  • SHA512

    cafcb3b8df8516825b56bdeab290d73e83bee360b6ed1934c3eea840f276dd184a40d3857372901de4aeda916474a6e92fbad94e3f60591c82ce915074a70e18

  • SSDEEP

    3072:sfTYRv2bVL8SW8uG63Cl56zqsWGeFT+scrSgERvwVvOePQ:PRvm98pGXFR9tpYdvQ

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b8bd56fc9e4446768aff0ebd96403e1d.exe
    "C:\Users\Admin\AppData\Local\Temp\b8bd56fc9e4446768aff0ebd96403e1d.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Users\Admin\AppData\Local\Temp\b8bd56fc9e4446768aff0ebd96403e1d.exe
      C:\Users\Admin\AppData\Local\Temp\b8bd56fc9e4446768aff0ebd96403e1d.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2896

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\b8bd56fc9e4446768aff0ebd96403e1d.exe

          Filesize

          133KB

          MD5

          86512438e2bcb8c42fed07b7667d4f75

          SHA1

          28b92e6606154b2b6540c66056d063d0b86e1ba6

          SHA256

          ed7b544e7922745a5af2a3b9071a43b135f88cdcc2a81a57953007b7c6fe6d88

          SHA512

          8296061df84822d44a82f342fde773384140bf01a398f75d73e33e64e30c4c2ac68bd351945303f68d0c2c4463f3125e34c956f7f8a4defdbab80b542c9be518

        • memory/2236-0-0x0000000000400000-0x0000000000486000-memory.dmp

          Filesize

          536KB

        • memory/2236-2-0x0000000000150000-0x0000000000171000-memory.dmp

          Filesize

          132KB

        • memory/2236-1-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2236-15-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2236-14-0x0000000001490000-0x0000000001516000-memory.dmp

          Filesize

          536KB

        • memory/2896-18-0x0000000000400000-0x0000000000486000-memory.dmp

          Filesize

          536KB

        • memory/2896-20-0x0000000000150000-0x0000000000171000-memory.dmp

          Filesize

          132KB

        • memory/2896-42-0x0000000000400000-0x0000000000486000-memory.dmp

          Filesize

          536KB