Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/03/2024, 13:29

General

  • Target

    c37d021933f5f95019f959649c29d5ba.exe

  • Size

    1003KB

  • MD5

    c37d021933f5f95019f959649c29d5ba

  • SHA1

    e63dc001b44a38b7ed5b7dbd94b35032da860412

  • SHA256

    01b3b18a334d75dbb2616a3e34eafcfccca70825c3a1d02b700f5584d4b98aa5

  • SHA512

    c508b6c9b14ee31c0fd67814b15fffbaa796a7af62b91f9f10eab2e6e4c943763796bb2e7e39a621cbb06a28b3fb4954193f927c186b29454750d504e6786af7

  • SSDEEP

    24576:9Ctv/nrqWrRdJ2Ek5mMX63YTjFvplgAdRKlt1:9Ctv/eWrN2twMX/XFxlgAdRKlt1

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Program crash 5 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c37d021933f5f95019f959649c29d5ba.exe
    "C:\Users\Admin\AppData\Local\Temp\c37d021933f5f95019f959649c29d5ba.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3760
    • C:\Users\Admin\AppData\Local\Temp\c37d021933f5f95019f959649c29d5ba.exe
      C:\Users\Admin\AppData\Local\Temp\c37d021933f5f95019f959649c29d5ba.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:3040
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\c37d021933f5f95019f959649c29d5ba.exe" /TN BpPBJTFwdd09 /F
        3⤵
        • Creates scheduled task(s)
        PID:2800
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN BpPBJTFwdd09 > C:\Users\Admin\AppData\Local\Temp\yGOVOyiDH.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2064
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN BpPBJTFwdd09
          4⤵
            PID:3492
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 616
          3⤵
          • Program crash
          PID:312
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 632
          3⤵
          • Program crash
          PID:696
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 744
          3⤵
          • Program crash
          PID:2176
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 728
          3⤵
          • Program crash
          PID:3804
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 736
          3⤵
          • Program crash
          PID:2612
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3040 -ip 3040
      1⤵
        PID:1196
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3040 -ip 3040
        1⤵
          PID:2036
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3040 -ip 3040
          1⤵
            PID:556
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 3040 -ip 3040
            1⤵
              PID:1056
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3040 -ip 3040
              1⤵
                PID:60

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\c37d021933f5f95019f959649c29d5ba.exe

                Filesize

                1003KB

                MD5

                777d78236902e5d40b3ac682340bc4b4

                SHA1

                3f2e8e0a6502ba5837c87eefbfee40ba88fd5674

                SHA256

                78ea16f558beea623a884bfb64fc199e5c6aa4aec3830169620943cde4624057

                SHA512

                9686257f684b36196e1b17bd59d7d73bdfbf7c33abdec76acdade8ed51ffe532c5e0bb3db88de122d47e1ea6d4864f8ace2fb549244185bb664db318d8b3430f

              • C:\Users\Admin\AppData\Local\Temp\yGOVOyiDH.xml

                Filesize

                1KB

                MD5

                6545a50ba3d772d0fc113b36afe374ec

                SHA1

                bc8e1555014a833a02200be3295b9c55f371d817

                SHA256

                5dbfd3bbc3e4508fb35409c929a974eda586e40e6c2ea67e02c5b630981e9a60

                SHA512

                bd8608351fd45fc17855aa5468565ad81b726020de4292b735c2d9949b4e2d52ac86090f0c417ae5d23e0602086c3736d4e70f6d9936d2ebc544ee5c9895db0b

              • memory/3040-14-0x0000000000400000-0x000000000065C000-memory.dmp

                Filesize

                2.4MB

              • memory/3040-17-0x0000000001720000-0x000000000179E000-memory.dmp

                Filesize

                504KB

              • memory/3040-23-0x0000000000400000-0x000000000045B000-memory.dmp

                Filesize

                364KB

              • memory/3040-22-0x0000000000470000-0x00000000004DB000-memory.dmp

                Filesize

                428KB

              • memory/3040-40-0x0000000000400000-0x000000000065C000-memory.dmp

                Filesize

                2.4MB

              • memory/3760-0-0x0000000000400000-0x000000000065C000-memory.dmp

                Filesize

                2.4MB

              • memory/3760-1-0x0000000000400000-0x000000000046B000-memory.dmp

                Filesize

                428KB

              • memory/3760-4-0x0000000001720000-0x000000000179E000-memory.dmp

                Filesize

                504KB

              • memory/3760-13-0x0000000000400000-0x000000000046B000-memory.dmp

                Filesize

                428KB