Analysis
-
max time kernel
150s -
max time network
59s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
18/09/2022, 23:34
Static task
static1
Behavioral task
behavioral1
Sample
048aaab28ec13a39ada87fea2c7f68d052457bd52737badab98bb02db696cff2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
048aaab28ec13a39ada87fea2c7f68d052457bd52737badab98bb02db696cff2.exe
Resource
win10v2004-20220812-en
General
-
Target
048aaab28ec13a39ada87fea2c7f68d052457bd52737badab98bb02db696cff2.exe
-
Size
386KB
-
MD5
c3283c6925ca9e2a4150a26f35f7f751
-
SHA1
05ae04b8ce4bde5bfc4c3e9caee349bf333b94d9
-
SHA256
048aaab28ec13a39ada87fea2c7f68d052457bd52737badab98bb02db696cff2
-
SHA512
4d3e5279b447cf884a0eacecf2014b37b6972c9154ddb93b5b417ebac01788a9edca380d230f4bf38853f768b99a621569ad701073c3b39a020381729a731812
-
SSDEEP
6144:QHEK7hRuRCRbhtUekwSFS/11dUhIMfu8/Bwqw8+CFBuh6333Ttr1aCmz2:4thvR9iPS/vSu8Mt4QhmHyCm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2032 eO01812JnEoO01812.exe -
resource yara_rule behavioral1/memory/1684-55-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/1684-60-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2032-62-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2032-64-0x0000000000400000-0x00000000004C9000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 2032 eO01812JnEoO01812.exe -
Loads dropped DLL 2 IoCs
pid Process 1684 048aaab28ec13a39ada87fea2c7f68d052457bd52737badab98bb02db696cff2.exe 1684 048aaab28ec13a39ada87fea2c7f68d052457bd52737badab98bb02db696cff2.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\eO01812JnEoO01812 = "C:\\ProgramData\\eO01812JnEoO01812\\eO01812JnEoO01812.exe" eO01812JnEoO01812.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main eO01812JnEoO01812.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1684 048aaab28ec13a39ada87fea2c7f68d052457bd52737badab98bb02db696cff2.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1684 048aaab28ec13a39ada87fea2c7f68d052457bd52737badab98bb02db696cff2.exe Token: SeDebugPrivilege 2032 eO01812JnEoO01812.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2032 eO01812JnEoO01812.exe 2032 eO01812JnEoO01812.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2032 1684 048aaab28ec13a39ada87fea2c7f68d052457bd52737badab98bb02db696cff2.exe 27 PID 1684 wrote to memory of 2032 1684 048aaab28ec13a39ada87fea2c7f68d052457bd52737badab98bb02db696cff2.exe 27 PID 1684 wrote to memory of 2032 1684 048aaab28ec13a39ada87fea2c7f68d052457bd52737badab98bb02db696cff2.exe 27 PID 1684 wrote to memory of 2032 1684 048aaab28ec13a39ada87fea2c7f68d052457bd52737badab98bb02db696cff2.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\048aaab28ec13a39ada87fea2c7f68d052457bd52737badab98bb02db696cff2.exe"C:\Users\Admin\AppData\Local\Temp\048aaab28ec13a39ada87fea2c7f68d052457bd52737badab98bb02db696cff2.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\ProgramData\eO01812JnEoO01812\eO01812JnEoO01812.exe"C:\ProgramData\eO01812JnEoO01812\eO01812JnEoO01812.exe" "C:\Users\Admin\AppData\Local\Temp\048aaab28ec13a39ada87fea2c7f68d052457bd52737badab98bb02db696cff2.exe"2⤵
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2032
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
386KB
MD5af79ee312487c808c302105fa478a14a
SHA1ed12c88e639b2519abc125c0fe5e335dbb46a9e4
SHA256223e70a38ff335389b3654faaf8e5f4f8bbea5c1981743562d05dfbb38cc69cd
SHA512ae2b9a137f4be8aa8e40015d7b6c9274a800b2dbc5c575cea55f184071ac01cf23d98b816ceb4111fe5d8bcbf4ab413a71f285c151472a9134f0886082f4f4a3
-
Filesize
386KB
MD5af79ee312487c808c302105fa478a14a
SHA1ed12c88e639b2519abc125c0fe5e335dbb46a9e4
SHA256223e70a38ff335389b3654faaf8e5f4f8bbea5c1981743562d05dfbb38cc69cd
SHA512ae2b9a137f4be8aa8e40015d7b6c9274a800b2dbc5c575cea55f184071ac01cf23d98b816ceb4111fe5d8bcbf4ab413a71f285c151472a9134f0886082f4f4a3
-
Filesize
386KB
MD5af79ee312487c808c302105fa478a14a
SHA1ed12c88e639b2519abc125c0fe5e335dbb46a9e4
SHA256223e70a38ff335389b3654faaf8e5f4f8bbea5c1981743562d05dfbb38cc69cd
SHA512ae2b9a137f4be8aa8e40015d7b6c9274a800b2dbc5c575cea55f184071ac01cf23d98b816ceb4111fe5d8bcbf4ab413a71f285c151472a9134f0886082f4f4a3
-
Filesize
386KB
MD5af79ee312487c808c302105fa478a14a
SHA1ed12c88e639b2519abc125c0fe5e335dbb46a9e4
SHA256223e70a38ff335389b3654faaf8e5f4f8bbea5c1981743562d05dfbb38cc69cd
SHA512ae2b9a137f4be8aa8e40015d7b6c9274a800b2dbc5c575cea55f184071ac01cf23d98b816ceb4111fe5d8bcbf4ab413a71f285c151472a9134f0886082f4f4a3