Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/03/2024, 21:38

General

  • Target

    c9adde8f65fdec5501fd8cd21121ddc0.exe

  • Size

    2.6MB

  • MD5

    c9adde8f65fdec5501fd8cd21121ddc0

  • SHA1

    920b2578cf538757a11228ca2f6f2df95ef3f7bf

  • SHA256

    8a2d2e05b0f82ff3b449bf9f09cc9e5bcd40e0fe4a4fbf421d61d5506c7afac2

  • SHA512

    8ae790534308da78e47843215a621727d1bcc6445fd49242ef4da4021315efe4a0d1caeff3919d90d189357846e298aeed43233a30bac93f9683a4c1620ca572

  • SSDEEP

    49152:J5D0sIP1GRc2rORO4Trtucx0ovPzrynnFqGyeyjmmmay3:PgbWVqI43tNnzrEFcY3

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c9adde8f65fdec5501fd8cd21121ddc0.exe
    "C:\Users\Admin\AppData\Local\Temp\c9adde8f65fdec5501fd8cd21121ddc0.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2488
    • C:\Users\Admin\AppData\Local\Temp\c9adde8f65fdec5501fd8cd21121ddc0.exe
      C:\Users\Admin\AppData\Local\Temp\c9adde8f65fdec5501fd8cd21121ddc0.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:3292

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\c9adde8f65fdec5501fd8cd21121ddc0.exe

    Filesize

    2.6MB

    MD5

    51fde1f3598e93eff373b1270e01971d

    SHA1

    7af8c838f91ddba422ce7875d71b7422a80b46f7

    SHA256

    f3c6f7e9ece0a5e0be7086bf532a00c8de0843125604f342593722a186cd41fc

    SHA512

    405535281c5e166f40482792f71bc5efb12df7bae90d0ff5e99939ade0a84d34f3ea4fc22d8b070dc0aa880e9c118b0818a531fc76c0db61d7e39f2f516ccf5a

  • memory/2488-0-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2488-1-0x00000000022C0000-0x000000000251A000-memory.dmp

    Filesize

    2.4MB

  • memory/2488-2-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/2488-13-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/3292-14-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/3292-16-0x0000000002250000-0x00000000024AA000-memory.dmp

    Filesize

    2.4MB

  • memory/3292-30-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB