Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    26/05/2024, 20:13

General

  • Target

    2d38747980ec02a8f957db282c3b02b1b3aafe3d1a1734a6144a0f1877a724d4.exe

  • Size

    134KB

  • MD5

    cd10dd77716897a82f8adee4a295e51e

  • SHA1

    cef504d1067bccb3e31c884d9291237e2c3379c5

  • SHA256

    2d38747980ec02a8f957db282c3b02b1b3aafe3d1a1734a6144a0f1877a724d4

  • SHA512

    3bc18d937ab0d0700fcb41ac0d5d38e9020ee6a10b73ace4528ca7d91fcad19e0049803f26616f895c1045c65a41fe8cbce5e7db2a2ac9c5b3098ca3a4d3afdf

  • SSDEEP

    1536:YGYU/W2/HG6QMauSV3ixJHABLrmhH7i9eNOOg00GqMIK7aGZh3SOk:YfU/WF6QMauSuiWNi9eNOl0007NZIOk

Score
9/10

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 5 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d38747980ec02a8f957db282c3b02b1b3aafe3d1a1734a6144a0f1877a724d4.exe
    "C:\Users\Admin\AppData\Local\Temp\2d38747980ec02a8f957db282c3b02b1b3aafe3d1a1734a6144a0f1877a724d4.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\ProgramData\Update\wuauclt.exe
      "C:\ProgramData\Update\wuauclt.exe" /run
      2⤵
      • Executes dropped EXE
      PID:2092
    • C:\windows\SysWOW64\cmd.exe
      "C:\windows\system32\cmd.exe" /c del /q "C:\Users\Admin\AppData\Local\Temp\2d38747980ec02a8f957db282c3b02b1b3aafe3d1a1734a6144a0f1877a724d4.exe" >> NUL
      2⤵
      • Deletes itself
      PID:2796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \ProgramData\Update\wuauclt.exe

    Filesize

    134KB

    MD5

    89db3fee66ab5c5079d361aa317b85cd

    SHA1

    b3ee23b7b49eb53c1fd55964d50df05276bd5b3d

    SHA256

    cdd3cfe7e90f9c75fad52b23dc0429f57f4937082b700977cb4b8be7de0dacc2

    SHA512

    1d3fc88acc939a940806cd32d5c454ffd9821791713dc2d6ddcf80d2bbe02b1d2aed3d7b289634a7236f37a6e29afb3ce95216531530e21146ef7dc2f3a6522c

  • memory/2020-5-0x00000000000F0000-0x0000000000118000-memory.dmp

    Filesize

    160KB

  • memory/2020-4-0x0000000000AB0000-0x0000000000AD8000-memory.dmp

    Filesize

    160KB

  • memory/2020-8-0x00000000000F0000-0x0000000000118000-memory.dmp

    Filesize

    160KB

  • memory/2020-10-0x0000000000AB0000-0x0000000000AD8000-memory.dmp

    Filesize

    160KB

  • memory/2092-7-0x0000000001020000-0x0000000001048000-memory.dmp

    Filesize

    160KB

  • memory/2092-9-0x0000000001020000-0x0000000001048000-memory.dmp

    Filesize

    160KB