Analysis
-
max time kernel
26s -
max time network
33s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
30-10-2020 17:32
Static task
static1
Behavioral task
behavioral1
Sample
Ez Dork Gen DELUXE.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Ez Dork Gen DELUXE.exe
Resource
win10v20201028
General
-
Target
Ez Dork Gen DELUXE.exe
-
Size
1.2MB
-
MD5
89fffdc32e34b6239d4dcc7ddd8f8fc2
-
SHA1
a33a1787b8a8768c421ba454b266925128f37818
-
SHA256
e64b88e64954b01b43964a3913adab7f0b6e1605492da920e1ad300a7158c423
-
SHA512
ed7fd226cd2e0eabcbc16408d996a84e16d8ed03f97833c56c9939db2512e115806e8027dfd67323b72af3b9058a08c9efee3f9f3b44cc888c348e379c00e40c
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
TempSetup.exe~Ez_Dork_Gen_DELUXE.exeSetup.exepid process 2004 TempSetup.exe 2032 ~Ez_Dork_Gen_DELUXE.exe 1980 Setup.exe -
Loads dropped DLL 1 IoCs
Processes:
TempSetup.exepid process 2004 TempSetup.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Setup.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows\CurrentVersion\Run\Intel(R) Common Networking System = "C:\\Users\\Admin\\AppData\\Roaming\\Intel Corporation\\Intel(R) Common User Interface\\8.1.1.7900\\svchost.exe" Setup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
Ez Dork Gen DELUXE.exeTempSetup.exeSetup.exedescription pid process target process PID 684 wrote to memory of 2004 684 Ez Dork Gen DELUXE.exe TempSetup.exe PID 684 wrote to memory of 2004 684 Ez Dork Gen DELUXE.exe TempSetup.exe PID 684 wrote to memory of 2004 684 Ez Dork Gen DELUXE.exe TempSetup.exe PID 684 wrote to memory of 2004 684 Ez Dork Gen DELUXE.exe TempSetup.exe PID 684 wrote to memory of 2004 684 Ez Dork Gen DELUXE.exe TempSetup.exe PID 684 wrote to memory of 2004 684 Ez Dork Gen DELUXE.exe TempSetup.exe PID 684 wrote to memory of 2004 684 Ez Dork Gen DELUXE.exe TempSetup.exe PID 684 wrote to memory of 2032 684 Ez Dork Gen DELUXE.exe ~Ez_Dork_Gen_DELUXE.exe PID 684 wrote to memory of 2032 684 Ez Dork Gen DELUXE.exe ~Ez_Dork_Gen_DELUXE.exe PID 684 wrote to memory of 2032 684 Ez Dork Gen DELUXE.exe ~Ez_Dork_Gen_DELUXE.exe PID 2004 wrote to memory of 1980 2004 TempSetup.exe Setup.exe PID 2004 wrote to memory of 1980 2004 TempSetup.exe Setup.exe PID 2004 wrote to memory of 1980 2004 TempSetup.exe Setup.exe PID 2004 wrote to memory of 1980 2004 TempSetup.exe Setup.exe PID 1980 wrote to memory of 1352 1980 Setup.exe svchost.exe PID 1980 wrote to memory of 1352 1980 Setup.exe svchost.exe PID 1980 wrote to memory of 1352 1980 Setup.exe svchost.exe PID 1980 wrote to memory of 1352 1980 Setup.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ez Dork Gen DELUXE.exe"C:\Users\Admin\AppData\Local\Temp\Ez Dork Gen DELUXE.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Local\TempSetup.exe"C:\Users\Admin\AppData\Local\TempSetup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\8.1.7601.17587\Setup.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\8.1.7601.17587\Setup.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Roaming\Intel Corporation\Intel(R) Common User Interface\8.1.1.7900\svchost.exe"C:\Users\Admin\AppData\Roaming\Intel Corporation\Intel(R) Common User Interface\8.1.1.7900\svchost.exe"4⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\~Ez_Dork_Gen_DELUXE.exe"C:\Users\Admin\AppData\Local\Temp\~Ez_Dork_Gen_DELUXE.exe"2⤵
- Executes dropped EXE
PID:2032
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
8cda5c66b6f92209c94ae927be3d895f
SHA1beb062bbdaeb180c8438f0762eddfeb59609fc02
SHA25671520637e17ca9034beec82a6c5fe21a0907e2fa8cdb376213e80535f41de6e4
SHA512c1b71e46c5a52c037a055aa7de1d16e6542e86d75751d2e26fc248875086745934493aa7a06c6faeed378006f5db13e62377ff6dfa85e9d1e215f5a6ab600436
-
MD5
8cda5c66b6f92209c94ae927be3d895f
SHA1beb062bbdaeb180c8438f0762eddfeb59609fc02
SHA25671520637e17ca9034beec82a6c5fe21a0907e2fa8cdb376213e80535f41de6e4
SHA512c1b71e46c5a52c037a055aa7de1d16e6542e86d75751d2e26fc248875086745934493aa7a06c6faeed378006f5db13e62377ff6dfa85e9d1e215f5a6ab600436
-
MD5
804cc6ded884925885f409a88e7244d0
SHA1ff29d809529b139c142fff0bc52c42bac4929e72
SHA256a60187fe7b2c794a2bc26d6eb86c4f292d2ed4c09871e14f661d8853eaa19ac4
SHA512f394e50fded112f90b8d771acd0d7cb8e82a2dc40fff1f6745cda00d955147830d2fb2de23e4dd131875ca7a7c0284779d8c2925f29ebab3c3eb1a49d5c57953
-
MD5
804cc6ded884925885f409a88e7244d0
SHA1ff29d809529b139c142fff0bc52c42bac4929e72
SHA256a60187fe7b2c794a2bc26d6eb86c4f292d2ed4c09871e14f661d8853eaa19ac4
SHA512f394e50fded112f90b8d771acd0d7cb8e82a2dc40fff1f6745cda00d955147830d2fb2de23e4dd131875ca7a7c0284779d8c2925f29ebab3c3eb1a49d5c57953
-
MD5
f64b69094e9cc63e63acec2be76bee4a
SHA1186733004af7ce6770883c9f8a1d658cdff67804
SHA2569c7ddac49954d267fe6ab5653bc1020c1058c216b6bcab6b6298333c8940988c
SHA5122872845d0a6a13895daac078b6f76413fd1f3ce68cade3de7d04d89168136153df28cc75bdea147d8f6cb29ecf82d255fd3f13cab14fb821a0b5549128660922
-
MD5
f64b69094e9cc63e63acec2be76bee4a
SHA1186733004af7ce6770883c9f8a1d658cdff67804
SHA2569c7ddac49954d267fe6ab5653bc1020c1058c216b6bcab6b6298333c8940988c
SHA5122872845d0a6a13895daac078b6f76413fd1f3ce68cade3de7d04d89168136153df28cc75bdea147d8f6cb29ecf82d255fd3f13cab14fb821a0b5549128660922
-
MD5
f64b69094e9cc63e63acec2be76bee4a
SHA1186733004af7ce6770883c9f8a1d658cdff67804
SHA2569c7ddac49954d267fe6ab5653bc1020c1058c216b6bcab6b6298333c8940988c
SHA5122872845d0a6a13895daac078b6f76413fd1f3ce68cade3de7d04d89168136153df28cc75bdea147d8f6cb29ecf82d255fd3f13cab14fb821a0b5549128660922