Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    13/03/2024, 06:06

General

  • Target

    c52a5453dbb2e944b1a24e7347743155.exe

  • Size

    1003KB

  • MD5

    c52a5453dbb2e944b1a24e7347743155

  • SHA1

    7a10008b71eddf59dbb533b8e34a036ca4d72c14

  • SHA256

    39976ff6aae887b4f01dbe48dc81cfa06cba5cb4b2e7e6e1ae16dfe109cf0995

  • SHA512

    37ce4dd96fe80ddb084c66be15f8998d72e93fb1f2223d0138343edf5bb15092849d3575e1393f477c788b3eb8079df9a96f8dfdbec60be815968bcaadf40c82

  • SSDEEP

    24576:8VFkkTd10AzNWqKSBjCcjukL2CDYibq6/yqLNaF:TkTdWAzNWqKSNCcakLz0ibq6yqh

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c52a5453dbb2e944b1a24e7347743155.exe
    "C:\Users\Admin\AppData\Local\Temp\c52a5453dbb2e944b1a24e7347743155.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2064
    • C:\Users\Admin\AppData\Local\Temp\c52a5453dbb2e944b1a24e7347743155.exe
      C:\Users\Admin\AppData\Local\Temp\c52a5453dbb2e944b1a24e7347743155.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2616
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\c52a5453dbb2e944b1a24e7347743155.exe" /TN w6CK1HQd991c /F
        3⤵
        • Creates scheduled task(s)
        PID:2660
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN w6CK1HQd991c > C:\Users\Admin\AppData\Local\Temp\aQYoc.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2592
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN w6CK1HQd991c
          4⤵
            PID:2724

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\aQYoc.xml

      Filesize

      1KB

      MD5

      f55b17fa335b6122ee76d5bc5c48156a

      SHA1

      4fb218fd753a68c5140d43c6a5125fd6d58e3a9b

      SHA256

      db3ad418894c4784aa3b8f11fc375cccda862fb021f9a0975ea0be40b23cecaa

      SHA512

      c9bc3e239457af4eff4626464b52f2e4380aab29f45e83bea4dfac8cf3dff1d573f8b047feaaf18df7919a0add7f9307f0ba337fb4e61b5769495d8b3ce45999

    • C:\Users\Admin\AppData\Local\Temp\c52a5453dbb2e944b1a24e7347743155.exe

      Filesize

      1003KB

      MD5

      7afc346ba6ccb4adadf5210feb16fd44

      SHA1

      51c4ffd7081ee8c2f965f64ea48b0eac89a0ca05

      SHA256

      13307a5787b38806fa074a177784014a5e687fd31b90d0d09ea1479cd71107b7

      SHA512

      8510dc354ca4d9d50f4f7f8197f006e37af0485e3fbb57f7f1817e470c2efbb990e3809edaf4dec31d0db72e80db4d016b84caafdca45ae703680be17d149a52

    • memory/2064-1-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/2064-7-0x0000000000350000-0x00000000003CE000-memory.dmp

      Filesize

      504KB

    • memory/2064-16-0x0000000022EA0000-0x00000000230FC000-memory.dmp

      Filesize

      2.4MB

    • memory/2064-15-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/2064-0-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2064-54-0x0000000022EA0000-0x00000000230FC000-memory.dmp

      Filesize

      2.4MB

    • memory/2616-20-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2616-26-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/2616-27-0x00000000002C0000-0x000000000032B000-memory.dmp

      Filesize

      428KB

    • memory/2616-22-0x0000000000240000-0x00000000002BE000-memory.dmp

      Filesize

      504KB

    • memory/2616-55-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB