Analysis
-
max time kernel
3s -
max time network
5s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
08/11/2020, 04:00
Static task
static1
Behavioral task
behavioral1
Sample
02ae530ebb33ee8528ac0b9061d41216d3f3d4dcd8e9b0fe7f7cd0511247b7df.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
02ae530ebb33ee8528ac0b9061d41216d3f3d4dcd8e9b0fe7f7cd0511247b7df.exe
Resource
win10v20201028
Errors
General
-
Target
02ae530ebb33ee8528ac0b9061d41216d3f3d4dcd8e9b0fe7f7cd0511247b7df.exe
-
Size
54KB
-
MD5
cdb6e431b4eeb2909b1cf198f70ae444
-
SHA1
98205803babd17587e99913934eb6975c3dc8779
-
SHA256
02ae530ebb33ee8528ac0b9061d41216d3f3d4dcd8e9b0fe7f7cd0511247b7df
-
SHA512
c24c5b4c3d1b9355db8e82aa3c1c228e12b107c2f2ad76ac5e1ec62dda516cbe2237b1839547ff80e9059a3f2debc1cf07daf30dc3dad2b579aa4eddb9ba33a0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2028 EyeCry.exe -
Loads dropped DLL 1 IoCs
pid Process 288 02ae530ebb33ee8528ac0b9061d41216d3f3d4dcd8e9b0fe7f7cd0511247b7df.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 EyeCry.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 1192 shutdown.exe Token: SeRemoteShutdownPrivilege 1192 shutdown.exe Token: SeShutdownPrivilege 1468 shutdown.exe Token: SeRemoteShutdownPrivilege 1468 shutdown.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 288 wrote to memory of 2028 288 02ae530ebb33ee8528ac0b9061d41216d3f3d4dcd8e9b0fe7f7cd0511247b7df.exe 26 PID 288 wrote to memory of 2028 288 02ae530ebb33ee8528ac0b9061d41216d3f3d4dcd8e9b0fe7f7cd0511247b7df.exe 26 PID 288 wrote to memory of 2028 288 02ae530ebb33ee8528ac0b9061d41216d3f3d4dcd8e9b0fe7f7cd0511247b7df.exe 26 PID 288 wrote to memory of 2028 288 02ae530ebb33ee8528ac0b9061d41216d3f3d4dcd8e9b0fe7f7cd0511247b7df.exe 26 PID 2028 wrote to memory of 1192 2028 EyeCry.exe 27 PID 2028 wrote to memory of 1192 2028 EyeCry.exe 27 PID 2028 wrote to memory of 1192 2028 EyeCry.exe 27 PID 2028 wrote to memory of 1192 2028 EyeCry.exe 27 PID 2028 wrote to memory of 1468 2028 EyeCry.exe 28 PID 2028 wrote to memory of 1468 2028 EyeCry.exe 28 PID 2028 wrote to memory of 1468 2028 EyeCry.exe 28 PID 2028 wrote to memory of 1468 2028 EyeCry.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\02ae530ebb33ee8528ac0b9061d41216d3f3d4dcd8e9b0fe7f7cd0511247b7df.exe"C:\Users\Admin\AppData\Local\Temp\02ae530ebb33ee8528ac0b9061d41216d3f3d4dcd8e9b0fe7f7cd0511247b7df.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:288 -
C:\Users\Admin\AppData\Local\Temp\EyeCry.exe"C:\Users\Admin\AppData\Local\Temp\EyeCry.exe"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\shutdown.exeshutdown.exe -r -f -t 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1192
-
-
C:\Windows\SysWOW64\shutdown.exeC:\Windows\System32\shutdown.exe -r -f -t 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1468
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1708
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1836