Analysis

  • max time kernel
    204s
  • max time network
    222s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/03/2024, 19:29

General

  • Target

    bc9cec951ee8290a8d93933014ec8180.exe

  • Size

    5.1MB

  • MD5

    bc9cec951ee8290a8d93933014ec8180

  • SHA1

    18400441938cd215d73b5970b58432f5fb974c94

  • SHA256

    4b92c60a33921907347279279cc1758e4f3df9ac3f373ae9408c9ba19a169cf1

  • SHA512

    3d49a5af7dbb0c40ea0999a1b86726d8bdd279fa81e66e726b008039da786d1d4d7b3535dd54a3072778e9fa19286a555425b41198485956d29b19bcf73319e6

  • SSDEEP

    49152:/TWuJSXpdaaXyf54fCuS8VzT+FYoji/USay35bkrfg8FYri+ts5EjdZwaA9jCIFg:/updaaXyhqVScTs/a30g2yOEjjs9/g3

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc9cec951ee8290a8d93933014ec8180.exe
    "C:\Users\Admin\AppData\Local\Temp\bc9cec951ee8290a8d93933014ec8180.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4380
    • C:\Users\Admin\AppData\Local\Temp\bc9cec951ee8290a8d93933014ec8180.exe
      C:\Users\Admin\AppData\Local\Temp\bc9cec951ee8290a8d93933014ec8180.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2856
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1416 --field-trial-handle=2304,i,6987730730348465820,3913273227385401271,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:3004

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\bc9cec951ee8290a8d93933014ec8180.exe

            Filesize

            5.1MB

            MD5

            53a06e56dd8a7d1dc8dd59dc65e9c9ce

            SHA1

            633ec2c519aa50aaf931078cfc83fb877cd7753a

            SHA256

            1ac3386d34b872d7d18b74221b29eab21929185a571474e3295fead9b1d9b48a

            SHA512

            d556308b7fd6f4186576b440707fbf15f30e9542a64b830072dcc9a5a513be8f75907db6b4cc7245326249cd70bdaf5f80c5e6cc94786ae0bb8506d6b440453a

          • memory/2856-16-0x0000000000400000-0x0000000000D9E000-memory.dmp

            Filesize

            9.6MB

          • memory/2856-18-0x0000000002210000-0x000000000246A000-memory.dmp

            Filesize

            2.4MB

          • memory/2856-23-0x0000000000400000-0x0000000000D9E000-memory.dmp

            Filesize

            9.6MB

          • memory/4380-0-0x0000000000400000-0x0000000000D9E000-memory.dmp

            Filesize

            9.6MB

          • memory/4380-1-0x0000000002380000-0x00000000025DA000-memory.dmp

            Filesize

            2.4MB

          • memory/4380-2-0x0000000000400000-0x0000000000D9E000-memory.dmp

            Filesize

            9.6MB

          • memory/4380-3-0x0000000000400000-0x0000000000605000-memory.dmp

            Filesize

            2.0MB

          • memory/4380-14-0x0000000000400000-0x0000000000605000-memory.dmp

            Filesize

            2.0MB