Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-03-2024 20:00

General

  • Target

    bcacefe7166422aa321a36f36e0a4dc4.exe

  • Size

    133KB

  • MD5

    bcacefe7166422aa321a36f36e0a4dc4

  • SHA1

    48e2b01fb1fe19621c53c8be6a87b4b295ef89b2

  • SHA256

    1e154c00e5098524c8408d41d51b3a768d5eea8242113903963932681a3537ca

  • SHA512

    5bc0eb5632f8e3716fea04976518cca8c8173eafb7797a45c1dfba01c0b9ab193a460b4c376b5cd871e8c62edd3a024712ac2210bf1ee0a1a7b7a2ac5b7b6df1

  • SSDEEP

    3072:Tk3flFYglnQl3AGj0/VPRmjGUe3e2XllufN9Xup/Q:KfD/nQl1jWgS92Tup/Q

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bcacefe7166422aa321a36f36e0a4dc4.exe
    "C:\Users\Admin\AppData\Local\Temp\bcacefe7166422aa321a36f36e0a4dc4.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:5068
    • C:\Users\Admin\AppData\Local\Temp\bcacefe7166422aa321a36f36e0a4dc4.exe
      C:\Users\Admin\AppData\Local\Temp\bcacefe7166422aa321a36f36e0a4dc4.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\bcacefe7166422aa321a36f36e0a4dc4.exe

    Filesize

    133KB

    MD5

    b98f03fb5ccadba2e887e2e55fb55c5c

    SHA1

    79ca856c8d77fa139502f1beda1798222b0489c0

    SHA256

    af92c7602b4e408bc4aacfa12c84e039429b247c6e2aeac33a5fd6e94a9fa49b

    SHA512

    20eb25f87bbd257f7e04350bb8fa544a1ef793b93712f253473042f165a0f0924a5f5532028e6ee9118c2c0434f8d306bbf5b5b53992085423f90dbda0bb936e

  • memory/640-15-0x00000000001A0000-0x00000000001C1000-memory.dmp

    Filesize

    132KB

  • memory/640-17-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/640-32-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/5068-0-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/5068-1-0x00000000000F0000-0x0000000000111000-memory.dmp

    Filesize

    132KB

  • memory/5068-2-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/5068-13-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB