Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    15/03/2024, 17:48

General

  • Target

    cc09a1ddbd5006b4a9819187d4fecb39.exe

  • Size

    3.9MB

  • MD5

    cc09a1ddbd5006b4a9819187d4fecb39

  • SHA1

    1b6a143fd9fd7de4fe5cd146c80749fe3c386b93

  • SHA256

    09b6ed4ae71f8479fb74ea9f9d3df0546a6a64a0eea751e59f2994852d38755f

  • SHA512

    3ba600d281ad7286f00d9a7ea421eadb7006edfcebfdcfe653687a1911934aea9f49193a36de454d92bf6d5d196cacf5321558e1f2247bca3ba21da9f120fae3

  • SSDEEP

    98304:pV69eC13cakcibiqhMbMgOn7n0bcakcibiqhG/JewlX9HGnrcakcibiqhMbMgOn1:p+dlirybMgOnkdlirhwlXhGnrdlirybo

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc09a1ddbd5006b4a9819187d4fecb39.exe
    "C:\Users\Admin\AppData\Local\Temp\cc09a1ddbd5006b4a9819187d4fecb39.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1068
    • C:\Users\Admin\AppData\Local\Temp\cc09a1ddbd5006b4a9819187d4fecb39.exe
      C:\Users\Admin\AppData\Local\Temp\cc09a1ddbd5006b4a9819187d4fecb39.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:1660
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\cc09a1ddbd5006b4a9819187d4fecb39.exe" /TN 6ek6uOO9da42 /F
        3⤵
        • Creates scheduled task(s)
        PID:2680
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN 6ek6uOO9da42 > C:\Users\Admin\AppData\Local\Temp\P5IKXeE13.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2604
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN 6ek6uOO9da42
          4⤵
            PID:2644

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\P5IKXeE13.xml

      Filesize

      1KB

      MD5

      6b572ee1c8fb1026627f24b04b02c49e

      SHA1

      09e9a77d82a3bca091a73215ee08f6a2f6343ba8

      SHA256

      e167bdf4ac6881a60596f4db270dbb71218536f11499346427228b4956f50489

      SHA512

      babb424f8297fcf1fdf1ed377f880fedf6d40af7098a06256061bbf7719a580accdeaf1d4795dd1c604539b6491fd424414493aa2c54e742d5fa564b8f77876f

    • \Users\Admin\AppData\Local\Temp\cc09a1ddbd5006b4a9819187d4fecb39.exe

      Filesize

      3.9MB

      MD5

      aaf99ddff6c84785e3f75d0a8f87b03d

      SHA1

      ee09d2a07c3bd0b451685a6c9f0dc960be3b1c7d

      SHA256

      4f3155d919f102dfc592fc225b43f1dca966350c5c7a45caad7c8d4e4ecafd28

      SHA512

      357fe190520252da793a79f4ea45dc6ed77be8a2ae426276a209fde60adc4f34302136fd2bedb763c8ed1a03a919ac7f10e3f6bcdd95993f6f33c3f3f6542760

    • memory/1068-0-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/1068-2-0x0000000000240000-0x00000000002BE000-memory.dmp

      Filesize

      504KB

    • memory/1068-1-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/1068-16-0x00000000237A0000-0x00000000239FC000-memory.dmp

      Filesize

      2.4MB

    • memory/1068-15-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/1660-19-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/1660-21-0x0000000000330000-0x00000000003AE000-memory.dmp

      Filesize

      504KB

    • memory/1660-26-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/1660-27-0x0000000000470000-0x00000000004DB000-memory.dmp

      Filesize

      428KB

    • memory/1660-45-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB