Analysis

  • max time kernel
    142s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/06/2024, 20:32

General

  • Target

    c53634448dc3b23426476cee9f69b735fe1100ac42518f538128d857606a7a59.exe

  • Size

    6.8MB

  • MD5

    28acddf226514843a2fda0b049d94395

  • SHA1

    cf387c8e5a3af7e02a409417be06e3c2a745751b

  • SHA256

    c53634448dc3b23426476cee9f69b735fe1100ac42518f538128d857606a7a59

  • SHA512

    e09e7fc359e9a2221cd1ca5e6083b186b961143d0c21b756d4eb8eddaba8e72e2059ef5f3824736c0455ce72d5c00fab21f862513fc47623373d67f17d0cced8

  • SSDEEP

    98304:LDvPIbilG4fUxB/nKTvAxJdNYcq/NY0B8gc6cZjWt+Z//37ibd4s6uipukP:oVxBfHxn6x6ILc6k2+ZHrhs65

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c53634448dc3b23426476cee9f69b735fe1100ac42518f538128d857606a7a59.exe
    "C:\Users\Admin\AppData\Local\Temp\c53634448dc3b23426476cee9f69b735fe1100ac42518f538128d857606a7a59.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2616
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c cd download&aria2c.exe --conf-path ./aria2.conf --check-certificate=false --disable-ipv6=false --enable-rpc=true --rpc-allow-origin-all=true --rpc-listen-all=true --rpc-listen-port 6288 --listen-port 6388 --dht-listen-port 6390 --enable-dht=true --enable-dht6=true --dht-file-path=./dht.dat --dht-file-path6=./dht6.dat --quiet=true --stop-with-process=2616
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4592
      • C:\Users\Admin\AppData\Local\Temp\download\aria2c.exe
        aria2c.exe --conf-path ./aria2.conf --check-certificate=false --disable-ipv6=false --enable-rpc=true --rpc-allow-origin-all=true --rpc-listen-all=true --rpc-listen-port 6288 --listen-port 6388 --dht-listen-port 6390 --enable-dht=true --enable-dht6=true --dht-file-path=./dht.dat --dht-file-path6=./dht6.dat --quiet=true --stop-with-process=2616
        3⤵
        • Executes dropped EXE
        PID:4836

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\download\aria2.conf

    Filesize

    3KB

    MD5

    d08f927d8a53cc5a7b97515318d126ad

    SHA1

    124d281c70d345566cc85a4680a993b754d2007e

    SHA256

    07e07944a526a7e9fb60bfedef59189b5950946f5a39b6df36de8ab74abf8729

    SHA512

    e90abf11942e3dd261039a4d9876659ec69a6099005c0f321e426d3de9ab20feb7b0105e98e7bc7747548ed4edfbb82bb0bc11c9d262e4db829aeb26ef1461bf

  • C:\Users\Admin\AppData\Local\Temp\download\aria2c.exe

    Filesize

    1.8MB

    MD5

    6d1fe9171538df42e013e6ecf330ec48

    SHA1

    a85203e77419c484a4434d56f96a0404b73ec588

    SHA256

    ef342516f4e2c211cd70cef033e558d598229c75e39292b668ae4ea7bf09eafe

    SHA512

    6603d1a60aa610c3269f9592877ef1a56f4dfe0f2496c017434ae1074fe8c3d0348386316129607d5dc09af1e7ae35f67e12fd72131652dc95e308b5581e1fbd

  • memory/2616-1-0x0000000010000000-0x0000000010116000-memory.dmp

    Filesize

    1.1MB

  • memory/4836-23-0x0000000000400000-0x00000000008B0000-memory.dmp

    Filesize

    4.7MB

  • memory/4836-25-0x0000000000400000-0x00000000008B0000-memory.dmp

    Filesize

    4.7MB