Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08/03/2024, 03:00

General

  • Target

    ba595ec60227f62720f07a77657a759a.exe

  • Size

    10.2MB

  • MD5

    ba595ec60227f62720f07a77657a759a

  • SHA1

    56a7f20df280905ade06e566c247dbfd2501dc37

  • SHA256

    903966f336c14b0d2a2876a57ced2094cdaacb1eaecc4781f04d4bf2ca02c0d2

  • SHA512

    97ae1da441dd0d12a16a2436aebd5c692aff2064642c943112f4ae781afec7b4c29f4f76f8395c33b36363f299eb6832c39862bd90d916e17e61fbc20211e1c0

  • SSDEEP

    98304:wADjts39+NGuimRwc+yz6mX3mI3mtFf3uiM6n39+NGuimRwc+yz6mX3:wA1AZm2wzZWeirZm2wz

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ba595ec60227f62720f07a77657a759a.exe
    "C:\Users\Admin\AppData\Local\Temp\ba595ec60227f62720f07a77657a759a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Users\Admin\AppData\Local\Temp\ba595ec60227f62720f07a77657a759a.exe
      C:\Users\Admin\AppData\Local\Temp\ba595ec60227f62720f07a77657a759a.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ba595ec60227f62720f07a77657a759a.exe

    Filesize

    7.1MB

    MD5

    f4508a1c6cdfd743a955715e4e35a068

    SHA1

    eb0ef5d07b34dacd1d1ef3b521f817b11c3a7aa9

    SHA256

    bb5c149f861c779d209022ce83c3db22d654a3108f41efecf201ccfcf9a3218c

    SHA512

    eba7a35cb288e09971e70f210ad76e7bd7ec650e3a48e235bffa3cb065b0e387702ec78668555574a86772156e747a88d925da0f596868ace402feba8a9aa164

  • \Users\Admin\AppData\Local\Temp\ba595ec60227f62720f07a77657a759a.exe

    Filesize

    7.7MB

    MD5

    505ffd6c0318c7c101a94df85637244b

    SHA1

    6f6a3a8bb86cdd0380665bd16c5bbea7124136e6

    SHA256

    6167faa38332057c80f789417ee4a5398d604b7517db70bb32fbe886c8481a90

    SHA512

    abe4eddd7c5349650ba444cb34a7e5edfa29c439ff6291dd3d015d98bb51e672f8f7311a9c4c65b6c5b6c349ba25e632d7abf78b7896db7a05c5d079231aa503

  • memory/1700-1-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/1700-0-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/1700-2-0x0000000002260000-0x00000000024BA000-memory.dmp

    Filesize

    2.4MB

  • memory/1700-14-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/1700-17-0x0000000004D60000-0x00000000056FE000-memory.dmp

    Filesize

    9.6MB

  • memory/1700-43-0x0000000004D60000-0x00000000056FE000-memory.dmp

    Filesize

    9.6MB

  • memory/2976-20-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2976-22-0x0000000002220000-0x000000000247A000-memory.dmp

    Filesize

    2.4MB

  • memory/2976-44-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB