Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 13:40
Static task
static1
Behavioral task
behavioral1
Sample
00e2b3374344e2f41953ba9b10ac30175c15d1c5bca9c669672f58c8ca88d8cf.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
00e2b3374344e2f41953ba9b10ac30175c15d1c5bca9c669672f58c8ca88d8cf.exe
Resource
win10v2004-20220901-en
General
-
Target
00e2b3374344e2f41953ba9b10ac30175c15d1c5bca9c669672f58c8ca88d8cf.exe
-
Size
148KB
-
MD5
92e2c42fd4680024562463d48ebc3518
-
SHA1
322e3c9ce8799657a5f6890b428b7581d97e87b3
-
SHA256
00e2b3374344e2f41953ba9b10ac30175c15d1c5bca9c669672f58c8ca88d8cf
-
SHA512
eb5be2c6b05e2a130a32cfd5b70961bcc68c10d6e30a328888cc2b575c025c3f5096e1117232adc1b299495b7c9686b724e2af5c4ea9d553c20e09c8893c2875
-
SSDEEP
3072:p/D0o/sla9yRKRbjA+X2BIm2JMGhj4f88iVAvO+reE+1xFIy:5Y7a9yI22DuoAvnreb1z
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 396 Ekacua.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 00e2b3374344e2f41953ba9b10ac30175c15d1c5bca9c669672f58c8ca88d8cf.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 00e2b3374344e2f41953ba9b10ac30175c15d1c5bca9c669672f58c8ca88d8cf.exe File created C:\Windows\Ekacua.exe 00e2b3374344e2f41953ba9b10ac30175c15d1c5bca9c669672f58c8ca88d8cf.exe File opened for modification C:\Windows\Ekacua.exe 00e2b3374344e2f41953ba9b10ac30175c15d1c5bca9c669672f58c8ca88d8cf.exe File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Ekacua.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Ekacua.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main Ekacua.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\International Ekacua.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe 396 Ekacua.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4832 wrote to memory of 396 4832 00e2b3374344e2f41953ba9b10ac30175c15d1c5bca9c669672f58c8ca88d8cf.exe 84 PID 4832 wrote to memory of 396 4832 00e2b3374344e2f41953ba9b10ac30175c15d1c5bca9c669672f58c8ca88d8cf.exe 84 PID 4832 wrote to memory of 396 4832 00e2b3374344e2f41953ba9b10ac30175c15d1c5bca9c669672f58c8ca88d8cf.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\00e2b3374344e2f41953ba9b10ac30175c15d1c5bca9c669672f58c8ca88d8cf.exe"C:\Users\Admin\AppData\Local\Temp\00e2b3374344e2f41953ba9b10ac30175c15d1c5bca9c669672f58c8ca88d8cf.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\Ekacua.exeC:\Windows\Ekacua.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:396
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD592e2c42fd4680024562463d48ebc3518
SHA1322e3c9ce8799657a5f6890b428b7581d97e87b3
SHA25600e2b3374344e2f41953ba9b10ac30175c15d1c5bca9c669672f58c8ca88d8cf
SHA512eb5be2c6b05e2a130a32cfd5b70961bcc68c10d6e30a328888cc2b575c025c3f5096e1117232adc1b299495b7c9686b724e2af5c4ea9d553c20e09c8893c2875
-
Filesize
148KB
MD592e2c42fd4680024562463d48ebc3518
SHA1322e3c9ce8799657a5f6890b428b7581d97e87b3
SHA25600e2b3374344e2f41953ba9b10ac30175c15d1c5bca9c669672f58c8ca88d8cf
SHA512eb5be2c6b05e2a130a32cfd5b70961bcc68c10d6e30a328888cc2b575c025c3f5096e1117232adc1b299495b7c9686b724e2af5c4ea9d553c20e09c8893c2875
-
Filesize
426B
MD5078d1ee8599dee34b3d4fbcad44f2dc3
SHA14da80781f4cef2c081d10501da39973736993381
SHA256dc52686efe6adbfadb69c400ca82857db4a24b167916b7219a4dbe3f779bcb1a
SHA5127b3acb7c66f0e4f1913c55b8eb15cfdb6ce9ba37dc5cfc2adbaaeee8d7e708e2fcef83d5a00da7d0fb9c2d27e6e39a9da1b1ad0c4f8f426b4045a7e6a552edb8