Analysis
-
max time kernel
144s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
resource tags
arch:x64arch:x86image:win10v2004-20220414-enlocale:en-usos:windows10-2004-x64system -
submitted
17-07-2022 15:23
Static task
static1
Behavioral task
behavioral1
Sample
51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exe
Resource
win7-20220414-en
General
-
Target
51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exe
-
Size
268KB
-
MD5
191e32c98a540b72ebddf3dfbb3436a4
-
SHA1
f812053fbb4dd3bb776b70b88a3bc494de7f9177
-
SHA256
51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1
-
SHA512
971c569e0389d9bd356200e3b1a9c8a644d5c09998108b9decf188c67143406850e58f64ba89c5be2fb307754050e997176352ebbd44ee51e81493075363f7fb
Malware Config
Extracted
gootkit
2410
clean.eco2plastic.com
ecos.eco2environmental.biz
trkajtools.com
quoteszones.com
mobileinstore.co.uk
-
vendor_id
2410
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe 1720 mstsc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2300 51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2300 51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2300 wrote to memory of 1720 2300 51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exe 83 PID 2300 wrote to memory of 1720 2300 51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exe 83 PID 2300 wrote to memory of 1720 2300 51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exe 83 PID 2300 wrote to memory of 1720 2300 51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exe 83 PID 2300 wrote to memory of 1720 2300 51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exe 83 PID 2300 wrote to memory of 1720 2300 51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exe 83 PID 2300 wrote to memory of 1720 2300 51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exe 83 PID 2300 wrote to memory of 1720 2300 51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exe 83 PID 1720 wrote to memory of 1844 1720 mstsc.exe 84 PID 1720 wrote to memory of 1844 1720 mstsc.exe 84 PID 1720 wrote to memory of 1844 1720 mstsc.exe 84 PID 1844 wrote to memory of 4108 1844 cmd.exe 86 PID 1844 wrote to memory of 4108 1844 cmd.exe 86 PID 1844 wrote to memory of 4108 1844 cmd.exe 86 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4108 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exe"C:\Users\Admin\AppData\Local\Temp\51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exe"1⤵
- Checks BIOS information in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\mstsc.exeC:\Windows\System32\mstsc.exe "C:\Users\Admin\AppData\Local\Temp\51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\240582125.bat" "C:\Users\Admin\AppData\Local\Temp\51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exe""3⤵
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exe"4⤵
- Views/modifies file attributes
PID:4108
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD52240ad41680d37a5d47330727efbd74a
SHA158ace4f45f44a2c853397d7ce03bd5db85122c5c
SHA256ecbcabc6562076551c4ccee5bffd5af849147b1bd57817e1e8a1d27ceb4fd266
SHA51279b64d945ec7e756a29d13937b67b07a59361794985d6665670ba4d3777638ce57caffb3b0fb0f16088ae3725d68a7c55d8704bc063171c4d7126e0dad97e75e