Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16/03/2024, 01:46

General

  • Target

    ccccce3991c08a2422f6067e727a854d.exe

  • Size

    2.6MB

  • MD5

    ccccce3991c08a2422f6067e727a854d

  • SHA1

    ab9f4d0a438e124f9e63653562af9683893bd6c9

  • SHA256

    396b4f204fff50948673227ddf3e86f01e9e1c6bc5405d4fae72729ae0f76f7a

  • SHA512

    cbe0f0d8798f2b7d2e02c2ac15f5b4dd3991d39a66ff0cc404ab738f1f8dc1816130f1ce7059f9e49a8b6dafd7e4c3fd1cd781a30fd60c1bd36d19608130982a

  • SSDEEP

    49152:PZ5Zm791qayVee6oKtnUQWQyHX2kwvr2bFeL4i5Way3:PZrcIee6uQeX2kwvvA3

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ccccce3991c08a2422f6067e727a854d.exe
    "C:\Users\Admin\AppData\Local\Temp\ccccce3991c08a2422f6067e727a854d.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Users\Admin\AppData\Local\Temp\ccccce3991c08a2422f6067e727a854d.exe
      C:\Users\Admin\AppData\Local\Temp\ccccce3991c08a2422f6067e727a854d.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:1984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ccccce3991c08a2422f6067e727a854d.exe

    Filesize

    896KB

    MD5

    6795b10affe5788ecc149edb437a3409

    SHA1

    4dd30f9e8da0e89474d701777a3e35eac56bdddd

    SHA256

    db4423e45f35b58dc6d0834b5cf7dfff847c6e605f064be6c4dbf17d6c094f4d

    SHA512

    905e3795f41e6c6ea34cbd4c073da6eb862c68fecc87b75b5aa45b26c6d449b3be95b14cd1dd64b4d583219b3eb5558b9c0ec3ef2f6df03d8a400d58609a1d0c

  • \Users\Admin\AppData\Local\Temp\ccccce3991c08a2422f6067e727a854d.exe

    Filesize

    1.0MB

    MD5

    62497728e6060e1d900b10ddbe5b42cc

    SHA1

    f9d98db491c314942965f5b464cb910dd0e16e2b

    SHA256

    453f225f413c551735e61b115647b188e2367fb9f104a18b0235511d23d9e6e9

    SHA512

    5f648df998e994926b0dde9b089c95bc42a6657a849fa4ee4d723935b4b972aa8155dd68256dc8f5596f5ca46264dadbd69243631a803ffad7edf6c5859d4963

  • memory/1984-19-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/1984-17-0x0000000001FA0000-0x00000000021FA000-memory.dmp

    Filesize

    2.4MB

  • memory/1984-42-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/3048-1-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/3048-0-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/3048-3-0x0000000001FA0000-0x00000000021FA000-memory.dmp

    Filesize

    2.4MB

  • memory/3048-15-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB