Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 20:35

General

  • Target

    39c4c860bb70156ce79ab0e6d82472ca8699f715b2c01ceea3dde8b30ef99466.exe

  • Size

    134KB

  • MD5

    42bc82cbc51846456552ef9857f3311c

  • SHA1

    0270665b27de798e67d8b0cab3934427d7749295

  • SHA256

    39c4c860bb70156ce79ab0e6d82472ca8699f715b2c01ceea3dde8b30ef99466

  • SHA512

    e4994d99b0b5d182da251a2ef7d4614bb65e9d4a8350bad2791456edcfac47a07d2d9de9699e13084c68e35edfaa6dd9b0361d80e8ec14e81df2877d996c67c4

  • SSDEEP

    1536:YGYU/W2/HG6QMauSV3ixJHABLrmhH7i9eNOOg00GqMIK7aGZh3SOa:YfU/WF6QMauSuiWNi9eNOl0007NZIOa

Score
9/10

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 6 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\39c4c860bb70156ce79ab0e6d82472ca8699f715b2c01ceea3dde8b30ef99466.exe
    "C:\Users\Admin\AppData\Local\Temp\39c4c860bb70156ce79ab0e6d82472ca8699f715b2c01ceea3dde8b30ef99466.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\ProgramData\Update\wuauclt.exe
      "C:\ProgramData\Update\wuauclt.exe" /run
      2⤵
      • Executes dropped EXE
      PID:1524
    • C:\windows\SysWOW64\cmd.exe
      "C:\windows\system32\cmd.exe" /c del /q "C:\Users\Admin\AppData\Local\Temp\39c4c860bb70156ce79ab0e6d82472ca8699f715b2c01ceea3dde8b30ef99466.exe" >> NUL
      2⤵
      • Deletes itself
      PID:2096

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • \ProgramData\Update\wuauclt.exe
    Filesize

    134KB

    MD5

    411dc618c6f6c011ccdbae69726f46d3

    SHA1

    71f9b513a63c5e3eb4a98bea0b3c30fc4332489a

    SHA256

    2d28b1a85c2542788dd98622fd4262797cca6a76c7fd839abffeacb99b48580d

    SHA512

    bbf338722af5bd46df372b37f9baf7fb18ff115612819705a9736cfb50acc2b600216a5f0c773e69753aed3a38c5aececc1ab941e1ebb3b868c946d26ab6ca46

  • memory/1524-7-0x0000000000C90000-0x0000000000CB8000-memory.dmp
    Filesize

    160KB

  • memory/1640-0-0x0000000000390000-0x00000000003B8000-memory.dmp
    Filesize

    160KB

  • memory/1640-4-0x0000000000130000-0x0000000000158000-memory.dmp
    Filesize

    160KB

  • memory/1640-8-0x0000000000390000-0x00000000003B8000-memory.dmp
    Filesize

    160KB

  • memory/1640-9-0x0000000000390000-0x00000000003B8000-memory.dmp
    Filesize

    160KB