Analysis

  • max time kernel
    139s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    19/03/2024, 00:55

General

  • Target

    d4ce6a5883eb19648994d776f03cc2e1.exe

  • Size

    605KB

  • MD5

    d4ce6a5883eb19648994d776f03cc2e1

  • SHA1

    4ff2ccf58f83fa02880d4334cf4d89de1b279a71

  • SHA256

    575b14b5113b2d776c3ae2ac7e56ded0e9184039f62a4e581c76f0332c668d30

  • SHA512

    fd26d9354e4b194f48b9dc8c2bc9b98e675f4fb6e0db08d03ed39a0c1ff9a18feaf0a9d952c9d7434e58a712c6c482b95bbd5e3dc85356dda115f0561f393005

  • SSDEEP

    12288:2IRMHepnraQ+MTPIpFSkCvimnQdcjdQ5f2uTevYZNIJuKipHm:2XMnra5MvVQCjdQ5+uav4NVa

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4ce6a5883eb19648994d776f03cc2e1.exe
    "C:\Users\Admin\AppData\Local\Temp\d4ce6a5883eb19648994d776f03cc2e1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Users\Admin\AppData\Local\Temp\d4ce6a5883eb19648994d776f03cc2e1.exe
      C:\Users\Admin\AppData\Local\Temp\d4ce6a5883eb19648994d776f03cc2e1.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:1968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\d4ce6a5883eb19648994d776f03cc2e1.exe

    Filesize

    605KB

    MD5

    643d40d86ef04e37803da381e4c42f27

    SHA1

    b13a83c4e4ba76c5848072b7c0cead8e9faa3d1b

    SHA256

    7c41ed709e2e9872ce29f3120ee71c38375ead7f9fe09d9cfc9c3a4254ed411d

    SHA512

    8ec696d96565180b86ce08b7768358e7cb7fbcf7f5766b6396da318a24596aed7e38669bb45fba0c7bba44fcff537c4ce02f4fb217a21dc9e2d42f9094df2c70

  • memory/1724-0-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/1724-1-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/1724-7-0x0000000000160000-0x0000000000191000-memory.dmp

    Filesize

    196KB

  • memory/1724-13-0x00000000014E0000-0x00000000015C0000-memory.dmp

    Filesize

    896KB

  • memory/1724-16-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/1968-24-0x0000000000310000-0x0000000000341000-memory.dmp

    Filesize

    196KB

  • memory/1968-34-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB