Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/03/2024, 15:10

General

  • Target

    e1f80c0c9b6c02a4767902430bc4610b.exe

  • Size

    5.5MB

  • MD5

    e1f80c0c9b6c02a4767902430bc4610b

  • SHA1

    3bb93798dd79c70ad7e5047b9cf1cc626b983ff9

  • SHA256

    1afcc027739cf90d1868572baf8d34461fbde263897d1e2ae2554186ae82991e

  • SHA512

    aa96275c9078e7875419f2e96689000abb6197074ab6660464990086a7db3bb1146a1f2e87b665b4c80f8a6e3920a69430e95465c77b9d1b46fc9c3f62737fdf

  • SSDEEP

    49152:39rGMdL4uK3MzR7US2/eXNYusf4lNIVlplay3vRmCFOGNj8mW4JH53R+wVG+l0yg:tKzUH2mXNZsQNklT35mCckFR+vicS43

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e1f80c0c9b6c02a4767902430bc4610b.exe
    "C:\Users\Admin\AppData\Local\Temp\e1f80c0c9b6c02a4767902430bc4610b.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3224
    • C:\Users\Admin\AppData\Local\Temp\e1f80c0c9b6c02a4767902430bc4610b.exe
      C:\Users\Admin\AppData\Local\Temp\e1f80c0c9b6c02a4767902430bc4610b.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:4708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\e1f80c0c9b6c02a4767902430bc4610b.exe

    Filesize

    3.1MB

    MD5

    da6a003ed81f12ee336df9d336fcbaf9

    SHA1

    b9e5cc8597662249cd5bb9ee734486994b28cff1

    SHA256

    c176413c1be182f44ee89376872e34fc30d3a1a1535d6fa4589ebe377156ca4b

    SHA512

    b0ed839a51ca2557c74d5afa5a66c7cc273e6c4e1b07e93bd10495bcbf9bf256e8dca1d6c558c7be8ddc59e6705e2389d7dd7b18f6196392a69bedb43356a9d9

  • memory/3224-0-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/3224-1-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/3224-3-0x00000000021A0000-0x00000000023FA000-memory.dmp

    Filesize

    2.4MB

  • memory/3224-13-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/4708-16-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/4708-18-0x00000000021C0000-0x000000000241A000-memory.dmp

    Filesize

    2.4MB

  • memory/4708-32-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB