Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-03-2024 15:05

General

  • Target

    bb9067ecd9ea0c5a0c0743484ca6b01f.exe

  • Size

    133KB

  • MD5

    bb9067ecd9ea0c5a0c0743484ca6b01f

  • SHA1

    2e9cc5b7a16997f58d99dcca9478aeceb14c758c

  • SHA256

    8942f8ee4165a75d94ae12f699b0cdf0ff49e1b7b012e3ce08e78e0ad2637ca7

  • SHA512

    c560303f2ae4af222e1b6d838471a76f146afa05e16314bf1ee4017f1f9f5965ab6d45c84d4d794e9ab5b80797102232a950ba3ad5c7de666be9381a2d303f27

  • SSDEEP

    3072:P+mWjvZHXdLV5JOr3EjCWYkxNe6SwaZbQ6ksqjsQuV0zIndoU/L7fBpQ:PYVX5P/ewaBQr18aUn/f3Q

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb9067ecd9ea0c5a0c0743484ca6b01f.exe
    "C:\Users\Admin\AppData\Local\Temp\bb9067ecd9ea0c5a0c0743484ca6b01f.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Users\Admin\AppData\Local\Temp\bb9067ecd9ea0c5a0c0743484ca6b01f.exe
      C:\Users\Admin\AppData\Local\Temp\bb9067ecd9ea0c5a0c0743484ca6b01f.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\bb9067ecd9ea0c5a0c0743484ca6b01f.exe

    Filesize

    133KB

    MD5

    2b75234fb6bd0b3838d5cbd32d5308f1

    SHA1

    f99b875a0a351db84f2d62c21537a7a9fb15841c

    SHA256

    c82eb479e4d173eddf81d9b396db9221f8e4faf3952557a19b8067e773417927

    SHA512

    5fb8eea3bd0d0e0c1fee30f3801e40b64acf295e862f57d47328050710ab4fe147ed515ad50bbd9ff0ba722e9cb3ecf29e6fe2f62cdbad83d379ad85b63863b1

  • memory/220-15-0x00000000001A0000-0x00000000001C1000-memory.dmp

    Filesize

    132KB

  • memory/220-18-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/220-30-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2392-0-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2392-1-0x00000000001C0000-0x00000000001E1000-memory.dmp

    Filesize

    132KB

  • memory/2392-2-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2392-13-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB