Analysis

  • max time kernel
    138s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13/03/2024, 19:08

General

  • Target

    c6a61de6f6845c8db77ecf5e6f4e48f4.exe

  • Size

    133KB

  • MD5

    c6a61de6f6845c8db77ecf5e6f4e48f4

  • SHA1

    419960a35e553ddb729f25e828d52fd744f9fac3

  • SHA256

    cb86c2c4c9ea5671c278af2d6766dc31e37f6679127d131ec9e9f071da48aef1

  • SHA512

    f0fa4b4a8efb7cc218c9cb18ceecb7d928bba2172ef9a5a6bfd2aaaf1786a0396336607b176fb3bcb35abb392a452b9055ba034809466df88598e7bc5fd2336d

  • SSDEEP

    3072:8V5tigqoRhve/Fjf4J3iYE/VIre9eZI1V+Q:8VgkhvedgivgqmIOQ

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6a61de6f6845c8db77ecf5e6f4e48f4.exe
    "C:\Users\Admin\AppData\Local\Temp\c6a61de6f6845c8db77ecf5e6f4e48f4.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2388
    • C:\Users\Admin\AppData\Local\Temp\c6a61de6f6845c8db77ecf5e6f4e48f4.exe
      C:\Users\Admin\AppData\Local\Temp\c6a61de6f6845c8db77ecf5e6f4e48f4.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\c6a61de6f6845c8db77ecf5e6f4e48f4.exe

    Filesize

    128KB

    MD5

    43755d62cebd09a3a0b6192acceeaa1b

    SHA1

    a527a6a54684bb4e0337bb7cea6441365a6c3c3c

    SHA256

    2f1534e8ddb7e1a11825eadc9a0ab34ee60d16526cf048de02952cecfeead17e

    SHA512

    a2893b9d27b4d4929ec4f496ef6cc85a9527cefb392cf56a7375b8207cea715dbb8df68d44ad1d6b2e4c99b4d8fff3248116b20ee2f0ef37d8b0359a59149c07

  • memory/2388-0-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2388-2-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2388-1-0x0000000000150000-0x0000000000171000-memory.dmp

    Filesize

    132KB

  • memory/2388-13-0x0000000002C50000-0x0000000002CD6000-memory.dmp

    Filesize

    536KB

  • memory/2388-15-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2948-17-0x0000000000150000-0x0000000000171000-memory.dmp

    Filesize

    132KB

  • memory/2948-41-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB