Analysis

  • max time kernel
    141s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    19/03/2024, 09:36

General

  • Target

    d5c90fd899df07108cdff6d9a4b25218.exe

  • Size

    133KB

  • MD5

    d5c90fd899df07108cdff6d9a4b25218

  • SHA1

    847d6682312f2a3795e1bfea1c36afcadb489fae

  • SHA256

    db26a9e91b1f507ebd6b3a95088b1dc34afba2adaf0f03431531dfc6f14e404d

  • SHA512

    905479380765c36dfd9e0242ecd6fe871c885e2113cbb04f8dec066f9cc1349b5ea2569bef6a59b51390b231aa95fc75d14feb1e13bacc1dc4d8d2f7cda1e4c4

  • SSDEEP

    3072:mPXrNKZYH+RhQ5pzSOqqZqVa8NtIoDyP1JOohcHW8RvbFQ:mP70ZAUQ5pRBMRtIOyLZhWp5Q

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5c90fd899df07108cdff6d9a4b25218.exe
    "C:\Users\Admin\AppData\Local\Temp\d5c90fd899df07108cdff6d9a4b25218.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3064
    • C:\Users\Admin\AppData\Local\Temp\d5c90fd899df07108cdff6d9a4b25218.exe
      C:\Users\Admin\AppData\Local\Temp\d5c90fd899df07108cdff6d9a4b25218.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2528

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\d5c90fd899df07108cdff6d9a4b25218.exe

    Filesize

    133KB

    MD5

    bc74e54fe8ba8ce8107ae4a4d03c3aeb

    SHA1

    e4088533ec6d6b861ea464612629b27c945e561c

    SHA256

    0d9a90f21e284f73c284ea0e1eb50ac9ee598fbe337013f7a2e26bf1ca688fcd

    SHA512

    f51aa06e0b73b291bc7bbc922e30b4033022e82a544a724ca51f8fa9c6531b413ebb04f5a02d23ba02654df60c0f12bf23ae20df9f5773f37cc42a318809c522

  • memory/2528-18-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2528-20-0x00000000001D0000-0x00000000001F1000-memory.dmp

    Filesize

    132KB

  • memory/2528-42-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/3064-0-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/3064-2-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3064-1-0x0000000000150000-0x0000000000171000-memory.dmp

    Filesize

    132KB

  • memory/3064-15-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3064-14-0x0000000002C60000-0x0000000002CE6000-memory.dmp

    Filesize

    536KB