Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2022, 20:48
Static task
static1
Behavioral task
behavioral1
Sample
6e6d2d21b75d10e19dfb5d3d15931c4420a900128485dec6687296fe77ef8d2a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6e6d2d21b75d10e19dfb5d3d15931c4420a900128485dec6687296fe77ef8d2a.exe
Resource
win10v2004-20220901-en
General
-
Target
6e6d2d21b75d10e19dfb5d3d15931c4420a900128485dec6687296fe77ef8d2a.exe
-
Size
229KB
-
MD5
35e02ae531bdfc5e355d0a3028443705
-
SHA1
5e66bb449f1c7124c681fc9ae776f85a56516b26
-
SHA256
6e6d2d21b75d10e19dfb5d3d15931c4420a900128485dec6687296fe77ef8d2a
-
SHA512
dc14cc51ecd84dd07504ff005d9b3f39bc65814a9ff10e207ab7f746e1302716e3222796ae884b559d915f603855126c36f8f2dca7b9e370e3bd617e1f3756d9
-
SSDEEP
6144:GN3oLzY164VZLZlad2nYQrJ6AthVbiN03KawzkV1O:scdWrYAtvbipz2O
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1588 Enihea.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Enihea.exe 6e6d2d21b75d10e19dfb5d3d15931c4420a900128485dec6687296fe77ef8d2a.exe File opened for modification C:\Windows\Enihea.exe 6e6d2d21b75d10e19dfb5d3d15931c4420a900128485dec6687296fe77ef8d2a.exe File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Enihea.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Enihea.exe File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 6e6d2d21b75d10e19dfb5d3d15931c4420a900128485dec6687296fe77ef8d2a.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 6e6d2d21b75d10e19dfb5d3d15931c4420a900128485dec6687296fe77ef8d2a.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\International Enihea.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main Enihea.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe 1588 Enihea.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5028 wrote to memory of 1588 5028 6e6d2d21b75d10e19dfb5d3d15931c4420a900128485dec6687296fe77ef8d2a.exe 82 PID 5028 wrote to memory of 1588 5028 6e6d2d21b75d10e19dfb5d3d15931c4420a900128485dec6687296fe77ef8d2a.exe 82 PID 5028 wrote to memory of 1588 5028 6e6d2d21b75d10e19dfb5d3d15931c4420a900128485dec6687296fe77ef8d2a.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e6d2d21b75d10e19dfb5d3d15931c4420a900128485dec6687296fe77ef8d2a.exe"C:\Users\Admin\AppData\Local\Temp\6e6d2d21b75d10e19dfb5d3d15931c4420a900128485dec6687296fe77ef8d2a.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\Enihea.exeC:\Windows\Enihea.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:1588
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229KB
MD535e02ae531bdfc5e355d0a3028443705
SHA15e66bb449f1c7124c681fc9ae776f85a56516b26
SHA2566e6d2d21b75d10e19dfb5d3d15931c4420a900128485dec6687296fe77ef8d2a
SHA512dc14cc51ecd84dd07504ff005d9b3f39bc65814a9ff10e207ab7f746e1302716e3222796ae884b559d915f603855126c36f8f2dca7b9e370e3bd617e1f3756d9
-
Filesize
229KB
MD535e02ae531bdfc5e355d0a3028443705
SHA15e66bb449f1c7124c681fc9ae776f85a56516b26
SHA2566e6d2d21b75d10e19dfb5d3d15931c4420a900128485dec6687296fe77ef8d2a
SHA512dc14cc51ecd84dd07504ff005d9b3f39bc65814a9ff10e207ab7f746e1302716e3222796ae884b559d915f603855126c36f8f2dca7b9e370e3bd617e1f3756d9
-
Filesize
426B
MD52f2bfa251e9a4a956ed6375157881f1f
SHA1f6880cebc3afe23afbe4f2800f534ef7a003eba7
SHA256729a7deaa23a7ba78f3f1fb18840d1ba3b14f6955086fdfbff76705e4e10b83e
SHA51278b75b02b2098e1a892c77dd1c0ba8cae3975a3aee5a61648ebd1dee29c35053105efce9a0c746face4fe920e3d13851042ea541bb656ce077e2604a3f144394