Analysis

  • max time kernel
    175s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 10:47

General

  • Target

    0ac7f4575c7cc9ed4a5258ac095ee04ee24aa595adc3356dd10207a7c7487a57.exe

  • Size

    148KB

  • MD5

    a7e4a15c238c5f1731329da0ce9535ca

  • SHA1

    b1694a2db44eb9c147607581f2d233ef6f97c304

  • SHA256

    0ac7f4575c7cc9ed4a5258ac095ee04ee24aa595adc3356dd10207a7c7487a57

  • SHA512

    0fbee04ac22a928e62ddef17e46b268c9ea2d732e55cc491c1e2a9397cd55618850fbf7fc8317493de17044a96727108b9df26cc1b4851687c5e89b852a202fc

  • SSDEEP

    3072:5NYD0o7ELVWeIrnt/Jb03S8Me2lqO7Z/n18wzA0HFIy:sYueIrndei82nh18wsi

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ac7f4575c7cc9ed4a5258ac095ee04ee24aa595adc3356dd10207a7c7487a57.exe
    "C:\Users\Admin\AppData\Local\Temp\0ac7f4575c7cc9ed4a5258ac095ee04ee24aa595adc3356dd10207a7c7487a57.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:3484
    • C:\Windows\Equqea.exe
      C:\Windows\Equqea.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      PID:936

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Equqea.exe

    Filesize

    148KB

    MD5

    a7e4a15c238c5f1731329da0ce9535ca

    SHA1

    b1694a2db44eb9c147607581f2d233ef6f97c304

    SHA256

    0ac7f4575c7cc9ed4a5258ac095ee04ee24aa595adc3356dd10207a7c7487a57

    SHA512

    0fbee04ac22a928e62ddef17e46b268c9ea2d732e55cc491c1e2a9397cd55618850fbf7fc8317493de17044a96727108b9df26cc1b4851687c5e89b852a202fc

  • C:\Windows\Equqea.exe

    Filesize

    148KB

    MD5

    a7e4a15c238c5f1731329da0ce9535ca

    SHA1

    b1694a2db44eb9c147607581f2d233ef6f97c304

    SHA256

    0ac7f4575c7cc9ed4a5258ac095ee04ee24aa595adc3356dd10207a7c7487a57

    SHA512

    0fbee04ac22a928e62ddef17e46b268c9ea2d732e55cc491c1e2a9397cd55618850fbf7fc8317493de17044a96727108b9df26cc1b4851687c5e89b852a202fc

  • C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job

    Filesize

    426B

    MD5

    b50c7b126eeef98f33164c65dc818fac

    SHA1

    ca705140911f55f59d635668fef90ba370cd23b9

    SHA256

    ac3c4f52e46e2e613e6ce548bd7a1e6e2f6fcd77e81f313027c898eecd277fae

    SHA512

    e6b8a0672c0c89a1fdd437f6182feca9f562dca2bda31e0b847a76130a9fc72befbf7dae202bac7b245c4c060818a31a0a52b5e121fcb9875da2b93e392fa802

  • memory/936-133-0x0000000000000000-mapping.dmp

  • memory/936-137-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/936-139-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/3484-132-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/3484-138-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/3484-140-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB