Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/03/2024, 12:59

General

  • Target

    bb52be35711e62a43b7fcb4a09050efc.exe

  • Size

    133KB

  • MD5

    bb52be35711e62a43b7fcb4a09050efc

  • SHA1

    b161de4e4e42fc32c29d54a70d259aeb930fa77b

  • SHA256

    02a121b52b898681f1781d99bb3848cd54478fa2a19e3579c940838f408fc5d3

  • SHA512

    0b50bc1261a3f62a0add06f28c9696b4438573bf748b52786da50696c9c965269b73cbb2d28245f2652657c5b6cbb1f125a559289d2239363d7476addb2333b5

  • SSDEEP

    3072:tT78Vct//7zTFe6fexgh4wACNj+piTCW9pYAMo+wayQ:ts2t/jzh7cghJNj+perz91Q

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb52be35711e62a43b7fcb4a09050efc.exe
    "C:\Users\Admin\AppData\Local\Temp\bb52be35711e62a43b7fcb4a09050efc.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Users\Admin\AppData\Local\Temp\bb52be35711e62a43b7fcb4a09050efc.exe
      C:\Users\Admin\AppData\Local\Temp\bb52be35711e62a43b7fcb4a09050efc.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:4208

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\bb52be35711e62a43b7fcb4a09050efc.exe

    Filesize

    133KB

    MD5

    fa9db48c665509654e97a86d6a5baa75

    SHA1

    7de6271dc92809938d071738691fd9a0d375e95f

    SHA256

    e01a20b3a5a9b23cccc8d507b2c1d7e9a880c8cd44288fd34c8fcf2db143d41d

    SHA512

    30bdf4d78fa7fa3732a33a36f54ab859912748f68251c694177923e474751d5ad058ff46533b3ec668b681043ed8154a2aa7a112b4b473b8fbb11a5e420a95c7

  • memory/3056-0-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/3056-1-0x00000000001C0000-0x00000000001E1000-memory.dmp

    Filesize

    132KB

  • memory/3056-2-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3056-16-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4208-14-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/4208-17-0x00000000001A0000-0x00000000001C1000-memory.dmp

    Filesize

    132KB

  • memory/4208-32-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB