Analysis

  • max time kernel
    146s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-08-2024 13:47

General

  • Target

    PC_ST/1. Check/4. OCCT.exe

  • Size

    84.2MB

  • MD5

    3753d2d63073ff1f9495f4f866ac6903

  • SHA1

    85510f02d7d0c5f3c826e6c038a3e7186081c7c3

  • SHA256

    4bc3fd9ba97c0a5210762681608f0a30aa2f829bf0a87ad5d1e6f922308744c6

  • SHA512

    5b0b1099d1810124f71bb15a8395d98970470b12d86346cfc504c1c482976bdd5aa2f7b553513d081a30a2cbe55ba459ca1cd9533fcc6f57303e56fd73be7e38

  • SSDEEP

    1572864:bPkD+a9I3WvDaf8jculVvBYiwtwN6Dbs08D1ixsQ4OvB1uuZa:wCl3WLa6wwYDuYWQ4iouZa

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 1 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: LoadsDriver 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PC_ST\1. Check\4. OCCT.exe
    "C:\Users\Admin\AppData\Local\Temp\PC_ST\1. Check\4. OCCT.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:4616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Costura\61EC80E19D6079BB89E44006371EC7DF\64\hwinfo64.dll

    Filesize

    2.0MB

    MD5

    a7d32a687f69938255bf4a9d18701ae9

    SHA1

    7d003f8002b8ae7eb5ea84bdb105f6ad3cd75b38

    SHA256

    e41be021bc34cefee383df4fdf8c02cc2865fd209c4c3d8880173ce6164b9827

    SHA512

    6fe5e0454329226a0f31e3f1e66622bb62ecd68a36c7eeba208e4c41d142f31096f43eb05c9de448076f8584d6d78c708749b62ebfca3cf4d5edc68d5689372b

  • C:\Users\Admin\AppData\Local\Temp\Costura\61EC80E19D6079BB89E44006371EC7DF\authenticodeexaminer.dll

    Filesize

    44KB

    MD5

    cb0562b0fd969ab9f03b339ff1af7b58

    SHA1

    4ccba420eaa47b13324284c979205360a6bac3fd

    SHA256

    f1b30e28db37952dd4b341c083d5cd837e36d3178c851a61a638d359891e204a

    SHA512

    cc9ac3908ad903862995d707bf0a29beb472bfc7b0d5b87ca03bc6184eac4c40ada7851de1038d2a1a8c23e7a25c1a545ef2accb4be14ecd27680022fbe66a42

  • C:\Users\Admin\AppData\Local\Temp\Costura\61EC80E19D6079BB89E44006371EC7DF\crc32.net.dll

    Filesize

    7KB

    MD5

    cce714483b5568f140c904c30a38bce6

    SHA1

    8c668f156d612b677bd4408f4578b8e6cb31104c

    SHA256

    9eafbec3431a3ddc072d870dd71f96d4fd421eff27b3f855fb29dde31463803a

    SHA512

    92a947245699d48f7aaef4340519496cd18f4ea245e0d7d4913bf8e5294e026aa3d7ca47c84772917f9014ba94f086d1dd30078a808f08de32866d32f6ec9fc9

  • C:\Users\Admin\AppData\Local\Temp\Costura\61EC80E19D6079BB89E44006371EC7DF\gongsolutions.wpf.dragdrop.dll

    Filesize

    103KB

    MD5

    a2f032cb0153143afe7843c7ace43328

    SHA1

    0bcf534de02f6dda6c6d3415868284b3c633d532

    SHA256

    ae8c0d78f3b2f86f3247c50953b96f23520102e980475dd4c236c70779c9fb33

    SHA512

    a06d84741889454db72140520623180d9cf7502f01fe678c3684448a6290d01fa90ca46377243205277a44a552493f805b6d19da08bbf924b204e4fba3276c93

  • C:\Users\Admin\AppData\Local\Temp\Costura\61EC80E19D6079BB89E44006371EC7DF\materialdesignthemes.wpf.dll

    Filesize

    8.4MB

    MD5

    e9d8411e55f85fc1665d5781b294664c

    SHA1

    cd827fff4c66e1b46d8cc7ff602d16a30dbb802b

    SHA256

    c76b20eaecfaa4d80f5ddbe7b41c7ed35d38dc3837176491e43b67d96b256c9d

    SHA512

    f142350f960402b9a205ac6812ed2a575eb304cf9c4837162d7929429518522e04d84399b23205594eb95a3ddcad4456c213c8679b4af707aa4537cd87ccfe56

  • C:\Users\Admin\AppData\Local\Temp\Costura\61EC80E19D6079BB89E44006371EC7DF\newtonsoft.json.dll

    Filesize

    685KB

    MD5

    081d9558bbb7adce142da153b2d5577a

    SHA1

    7d0ad03fbda1c24f883116b940717e596073ae96

    SHA256

    b624949df8b0e3a6153fdfb730a7c6f4990b6592ee0d922e1788433d276610f3

    SHA512

    2fdf035661f349206f58ea1feed8805b7f9517a21f9c113e7301c69de160f184c774350a12a710046e3ff6baa37345d319b6f47fd24fbba4e042d54014bee511

  • C:\Users\Admin\AppData\Local\Temp\Costura\61EC80E19D6079BB89E44006371EC7DF\oxyplot.dll

    Filesize

    561KB

    MD5

    c5893a4a4da153dc96a41862cfb538ac

    SHA1

    b68abd36a07fc97968d5f3d743cfe6136ab33be8

    SHA256

    6caa88e4d86696913ba504eecb5065ca02aa2fae5cbdf4ab683f0347691c250c

    SHA512

    dcda9efa80239a87173206563237d4a90615e5de05ca816fa9a38efd738f696261f5d2a5dc00de4b11c91eb46866124bbb8cfdc9f6b5da917b05078bd68f6e5c

  • C:\Users\Admin\AppData\Local\Temp\Costura\61EC80E19D6079BB89E44006371EC7DF\sharpcompress.dll

    Filesize

    531KB

    MD5

    020a34efa9c42363c53e100dbcc02738

    SHA1

    3625214feb9307c0fa423d734cd6c1e7261bc349

    SHA256

    d55f6bbddf30d53def0dce5f368a68288a45151b6a0fa3addd863381fd7e4512

    SHA512

    01d96374b5a5ecdfe125d9c6bba1e31a33e167306f14681ec60d18ccdbf8f5c2680d7179a1739cc393f0464f0ac47d69f41c9bb248b147a1eaccfa336944c5c4

  • C:\Users\Admin\AppData\Local\Temp\Costura\61EC80E19D6079BB89E44006371EC7DF\simpleinjector.dll

    Filesize

    444KB

    MD5

    d9076eb96cc817079ee194645325e239

    SHA1

    8ac8449d2eaebe44e0064dbcff627eae673199d5

    SHA256

    d159cbb6cb43f0fab85c5794cbd2607458c2fb5cde83c98322320612f614a040

    SHA512

    b51cc4cde916b9228a8e7070358adf9b26082f641bd085a1c0b039b212765a8de81b45a0365d8097a7c415e220129b9d97fd4172ecf4d6e67b3241177268f48a

  • C:\Users\Admin\AppData\Local\Temp\Costura\61EC80E19D6079BB89E44006371EC7DF\system.buffers.dll

    Filesize

    20KB

    MD5

    ecdfe8ede869d2ccc6bf99981ea96400

    SHA1

    2f410a0396bc148ed533ad49b6415fb58dd4d641

    SHA256

    accccfbe45d9f08ffeed9916e37b33e98c65be012cfff6e7fa7b67210ce1fefb

    SHA512

    5fc7fee5c25cb2eee19737068968e00a00961c257271b420f594e5a0da0559502d04ee6ba2d8d2aad77f3769622f6743a5ee8dae23f8f993f33fb09ed8db2741

  • C:\Users\Admin\AppData\Local\Temp\Costura\61EC80E19D6079BB89E44006371EC7DF\system.memory.dll

    Filesize

    138KB

    MD5

    f09441a1ee47fb3e6571a3a448e05baf

    SHA1

    3c5c5df5f8f8db3f0a35c5ed8d357313a54e3cde

    SHA256

    bf3fb84664f4097f1a8a9bc71a51dcf8cf1a905d4080a4d290da1730866e856f

    SHA512

    0199ae0633bccfeaefbb5aed20832a4379c7ad73461d41a9da3d6dc044093cc319670e67c4efbf830308cbd9a48fb40d4a6c7e472dcc42eb745c6ba813e8e7c6

  • C:\Users\Admin\AppData\Local\Temp\Costura\61EC80E19D6079BB89E44006371EC7DF\system.runtime.compilerservices.unsafe.dll

    Filesize

    17KB

    MD5

    c610e828b54001574d86dd2ed730e392

    SHA1

    180a7baafbc820a838bbaca434032d9d33cceebe

    SHA256

    37768488e8ef45729bc7d9a2677633c6450042975bb96516e186da6cb9cd0dcf

    SHA512

    441610d2b9f841d25494d7c82222d07e1d443b0da07f0cf735c25ec82f6cce99a3f3236872aec38cc4df779e615d22469666066ccefed7fe75982eefada46396

  • C:\Users\Admin\AppData\Local\Temp\HWiNFO64A_173.SYS

    Filesize

    55KB

    MD5

    e82c3dda0ff85a93265570b703e8079e

    SHA1

    460ed5f2c2283c63bc39274358d091c76044df33

    SHA256

    cca693f6a3717bf8f7b762953721ea167a3ef8cc1580068b18d2743b2b81694f

    SHA512

    c47654f22aa479bb3133f25efe8865a73c14fd40fe5dbef7636de6a11cc746363b89687a04ad51654a792ec90a4000c091723762c15e99308907ff960560ae27

  • C:\Users\Admin\AppData\Local\Temp\OCCT\CPULINPACK\v2021\HPL.LICENSE.txt

    Filesize

    42KB

    MD5

    3ae60d84f7def40cdf677614f2ef8b9e

    SHA1

    ae01c93ad43356ed49198f9d869f2357f98f221a

    SHA256

    1ad95fdc23e0fceecfd5bfd55287e766dd352de6bda61b19080411df22044dc6

    SHA512

    66ddd6669b32e9a254b0526c3bc200ee2d23356606a1039871b2240864eebeab513865bd2bf9a35eca6a8c64619f6a8162649bdd2c27a5a2abca32a83f891f9d

  • C:\Users\Admin\AppData\Local\Temp\TmpA97E.tmp

    Filesize

    4KB

    MD5

    1c4a03d119f532dab46c77accfb488f5

    SHA1

    d55b5a0a00bc389e4060042aff87c7d43ffd1a08

    SHA256

    b80b718bcdc91664d9f3bfb49a8a97e67d193ada752958282b35ebd3f3ced4ee

    SHA512

    44a29099d6dcb48cf4bcffa5eb7c33774eb27cf15d54b47e93525cce68161725ab2f723df13065af50bed32dd2d26bc7e63b3e6e942e9069cf91a3680776712a

  • memory/4616-315-0x0000019AA7560000-0x0000019AA756A000-memory.dmp

    Filesize

    40KB

  • memory/4616-299-0x0000019AA7630000-0x0000019AA7656000-memory.dmp

    Filesize

    152KB

  • memory/4616-319-0x0000019AA8020000-0x0000019AA8896000-memory.dmp

    Filesize

    8.5MB

  • memory/4616-310-0x0000019AA7580000-0x0000019AA759E000-memory.dmp

    Filesize

    120KB

  • memory/4616-294-0x0000019AA5440000-0x0000019AA5448000-memory.dmp

    Filesize

    32KB

  • memory/4616-306-0x0000019AA7530000-0x0000019AA7538000-memory.dmp

    Filesize

    32KB

  • memory/4616-290-0x0000019AA75A0000-0x0000019AA762C000-memory.dmp

    Filesize

    560KB

  • memory/4616-302-0x0000019AA7700000-0x0000019AA7792000-memory.dmp

    Filesize

    584KB

  • memory/4616-286-0x0000019AA5450000-0x0000019AA5500000-memory.dmp

    Filesize

    704KB

  • memory/4616-0-0x00007FF9D4233000-0x00007FF9D4235000-memory.dmp

    Filesize

    8KB

  • memory/4616-282-0x0000019AA5220000-0x0000019AA5296000-memory.dmp

    Filesize

    472KB

  • memory/4616-332-0x0000019AA5430000-0x0000019AA5440000-memory.dmp

    Filesize

    64KB

  • memory/4616-143-0x0000000180000000-0x00000001805DA000-memory.dmp

    Filesize

    5.9MB

  • memory/4616-342-0x0000019AA79F0000-0x0000019AA7A40000-memory.dmp

    Filesize

    320KB

  • memory/4616-12-0x00007FF9D4230000-0x00007FF9D4CF1000-memory.dmp

    Filesize

    10.8MB

  • memory/4616-1-0x0000019A84020000-0x0000019A8945A000-memory.dmp

    Filesize

    84.2MB

  • memory/4616-396-0x0000000180000000-0x00000001805DA000-memory.dmp

    Filesize

    5.9MB

  • memory/4616-397-0x00007FF9D4230000-0x00007FF9D4CF1000-memory.dmp

    Filesize

    10.8MB