Analysis

  • max time kernel
    94s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/10/2022, 10:34

General

  • Target

    e0aed088839564c31a0ecef09f63329a07304d05e3ea3cd6b44ee04d3d4dcf7d.exe

  • Size

    77KB

  • MD5

    fb56a4f1f8a68dad6763d5e060a86149

  • SHA1

    261a396d632f0ce3142ccf1572f6b2cd4560789b

  • SHA256

    e0aed088839564c31a0ecef09f63329a07304d05e3ea3cd6b44ee04d3d4dcf7d

  • SHA512

    a06381ac0195c5b4e61c3126c431f5b39097ec22712a810f7ce0598cd78640f1238f71e9224f0a71d40b6a598b10bd8d4ecb8c40f9b64ba0e9155d15c47bb3a5

  • SSDEEP

    1536:AUHuE2VSGTS5YINmv53Snc3OivLF5/NzQqeBSnpwbOHmgE5Xq0:AUHuE2EGW5YIM3/e+FdNzoBZemgEs0

Score
8/10

Malware Config

Signatures

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Modifies WinLogon 2 TTPs 8 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e0aed088839564c31a0ecef09f63329a07304d05e3ea3cd6b44ee04d3d4dcf7d.exe
    "C:\Users\Admin\AppData\Local\Temp\e0aed088839564c31a0ecef09f63329a07304d05e3ea3cd6b44ee04d3d4dcf7d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4984
    • C:\Users\Admin\AppData\Local\Temp\e0aed088839564c31a0ecef09f63329a07304d05e3ea3cd6b44ee04d3d4dcf7d.exe
      C:\Users\Admin\AppData\Local\Temp\e0aed088839564c31a0ecef09f63329a07304d05e3ea3cd6b44ee04d3d4dcf7d.exe
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Modifies WinLogon
      PID:4956

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\enimbsy.dll

    Filesize

    31KB

    MD5

    2541c4e9417524173d8c28c405a641ae

    SHA1

    10513e91245a2b3d0b5ef54ce587d3a547c9cf53

    SHA256

    0181705204ad4575711caccf6099b4aa84ed54594f07b61e0bbeef27b527936d

    SHA512

    f87816c1a8226c8553153c5376b53b91358208368255e71429f0eb602b964c68916620d6d28844d22ac42a975d14af0cc4464a79dca3a27769755f95d4fad29f

  • memory/4956-133-0x0000000000400000-0x0000000001400000-memory.dmp

    Filesize

    16.0MB

  • memory/4956-137-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/4956-136-0x0000000000400000-0x0000000001400000-memory.dmp

    Filesize

    16.0MB

  • memory/4956-138-0x0000000000400000-0x0000000001400000-memory.dmp

    Filesize

    16.0MB

  • memory/4956-140-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/4984-134-0x0000000000AB0000-0x0000000000AB4000-memory.dmp

    Filesize

    16KB