Analysis

  • max time kernel
    99s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/03/2024, 12:26

General

  • Target

    e1aa8f4c3747d4e93b4f966cb81063f8.exe

  • Size

    1003KB

  • MD5

    e1aa8f4c3747d4e93b4f966cb81063f8

  • SHA1

    0f60ba5d192062aa422b0b5ee56f8737f8fd7380

  • SHA256

    df2fec09e7d51ab44d9baed8993b239fc7840c11ed8d14c4ab30be1363b4dc71

  • SHA512

    e5365622b726bce1e14cf0e7981f795d103e310e3c5db668e0617301960e7d918c508add384fe6bf84d5fde7f458fd24e4d4b3a7486461be64af43eebde679b5

  • SSDEEP

    24576:9GS8qQBrVwKEshriAdnyfl43kLCGrNhiWtSCjHg:SnBrVwKEariMyt43kLCGrNhiW0CjA

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e1aa8f4c3747d4e93b4f966cb81063f8.exe
    "C:\Users\Admin\AppData\Local\Temp\e1aa8f4c3747d4e93b4f966cb81063f8.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3760
    • C:\Users\Admin\AppData\Local\Temp\e1aa8f4c3747d4e93b4f966cb81063f8.exe
      C:\Users\Admin\AppData\Local\Temp\e1aa8f4c3747d4e93b4f966cb81063f8.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:3872
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\e1aa8f4c3747d4e93b4f966cb81063f8.exe" /TN qPTTkyZ9c33c /F
        3⤵
        • Creates scheduled task(s)
        PID:764
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN qPTTkyZ9c33c > C:\Users\Admin\AppData\Local\Temp\wQLYhZw.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3356
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN qPTTkyZ9c33c
          4⤵
            PID:1376
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 616
          3⤵
          • Program crash
          PID:1364
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 628
          3⤵
          • Program crash
          PID:5036
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3872 -ip 3872
      1⤵
        PID:1928
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3872 -ip 3872
        1⤵
          PID:4952

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\e1aa8f4c3747d4e93b4f966cb81063f8.exe

          Filesize

          1003KB

          MD5

          91f83732209269b71c27aab6ff811a45

          SHA1

          59333ebf48b46dfa34d78f3e55a86037dac875f1

          SHA256

          7a5dad10ff09f13cada065102b3200f6a139d5046b9cceca924c4e65cba75938

          SHA512

          b56724a5c55d860d19d7a267812e8b98a656e8c25420ab1dcbfb12ef53c050d273fec323b6a664257ea0b2d816ea6490e9387308f27bbf6fb284f89e8b5c4e55

        • C:\Users\Admin\AppData\Local\Temp\wQLYhZw.xml

          Filesize

          1KB

          MD5

          2af8baa50156019c0461297aef4442a9

          SHA1

          ce1ee11d4b781ad641f849604193a5f3a6ea58e6

          SHA256

          371d1e61600853812805726a1226cb79565ff25ed7bb9e8cc5c0b02f9aa5b542

          SHA512

          95dfbee64def6747adb65aca54f68891f4d7644af96f8d16958517c4bb2b96ca4be1b114a5e1f368b0e6a7c5d6e4eea3de86d8552bbff5dc045839fdbb5d6e3d

        • memory/3760-0-0x0000000000400000-0x000000000065C000-memory.dmp

          Filesize

          2.4MB

        • memory/3760-1-0x0000000000400000-0x000000000046B000-memory.dmp

          Filesize

          428KB

        • memory/3760-5-0x0000000025020000-0x000000002509E000-memory.dmp

          Filesize

          504KB

        • memory/3760-13-0x0000000000400000-0x000000000046B000-memory.dmp

          Filesize

          428KB

        • memory/3872-14-0x0000000000400000-0x000000000065C000-memory.dmp

          Filesize

          2.4MB

        • memory/3872-16-0x0000000001730000-0x00000000017AE000-memory.dmp

          Filesize

          504KB

        • memory/3872-22-0x0000000000470000-0x00000000004DB000-memory.dmp

          Filesize

          428KB

        • memory/3872-23-0x0000000000400000-0x000000000045B000-memory.dmp

          Filesize

          364KB

        • memory/3872-43-0x0000000000400000-0x000000000065C000-memory.dmp

          Filesize

          2.4MB