Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/03/2024, 11:22

General

  • Target

    c0775804dd156fded0b4f65b57f4f20a.exe

  • Size

    133KB

  • MD5

    c0775804dd156fded0b4f65b57f4f20a

  • SHA1

    2c06a400946e1f737229efe0aaaf0955343946b7

  • SHA256

    85d66b3783abbc64d0511b828a435c57e3a3182dd7a7f216e1e131c1ee8367e9

  • SHA512

    368ba16be42277d01ce94bf6eb2d785da3070d12c6ee3ba00edb6b2f6a306267d7bd2c66fbd79bc186d5713608e391a9f899a370933b679b398a03bf672ead24

  • SSDEEP

    3072:O4dmO9IWeoFO3tO2IwhLK0Pg42bQLgnfhmsrRMn01Q:OumOmWFp2xhLJ/qQLg5m0FQ

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0775804dd156fded0b4f65b57f4f20a.exe
    "C:\Users\Admin\AppData\Local\Temp\c0775804dd156fded0b4f65b57f4f20a.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3076
    • C:\Users\Admin\AppData\Local\Temp\c0775804dd156fded0b4f65b57f4f20a.exe
      C:\Users\Admin\AppData\Local\Temp\c0775804dd156fded0b4f65b57f4f20a.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:1448

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\c0775804dd156fded0b4f65b57f4f20a.exe

    Filesize

    133KB

    MD5

    521b4136a748bd60be1cfec3fdabfc22

    SHA1

    bf688d544f9264a786bc9f172653411365a34b76

    SHA256

    832445888b95265246d17a8a5bbda32e6d8228d3ef5bdbfe69b2740827ba2d3c

    SHA512

    c175048743266cf89ff0d7c34e7fe19bd307d97ce3dbac5fa84803066688acc611a412fe87c35fce3ea7786728fb6f7421012eea6c91a5c782e5feb388beb00b

  • memory/1448-14-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/1448-17-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1448-16-0x00000000001A0000-0x00000000001C1000-memory.dmp

    Filesize

    132KB

  • memory/1448-31-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/3076-0-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/3076-1-0x00000000001C0000-0x00000000001E1000-memory.dmp

    Filesize

    132KB

  • memory/3076-2-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3076-15-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB