Analysis

  • max time kernel
    8s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 02:39

General

  • Target

    eb0a5411171e2858b32cc5eab75387f1c44b5e7d5df6597ae8f3cf32ed4f5ce9.exe

  • Size

    17.5MB

  • MD5

    319d75130c5ba896f6f515b3f7c2d3f8

  • SHA1

    d414c5bc6bcbd4a68229e71e9a1963bdf3fe6b1d

  • SHA256

    eb0a5411171e2858b32cc5eab75387f1c44b5e7d5df6597ae8f3cf32ed4f5ce9

  • SHA512

    30ecaebb8059005b6a87ef3212059b5d6719e03cb84bdd41608f53ccb1d145ef5c3055e4614da7471d131d5ce75e49d76c4eadaf41a0fbd4aa17fbfe192ba516

  • SSDEEP

    393216:wVg38yOX6vVrV4IeW1altTRFhURxNbqn9xWjZLm35Ijdv/L9omG:RVmGMtRFhUfMni0JIjdLOmG

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 9 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 33 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb0a5411171e2858b32cc5eab75387f1c44b5e7d5df6597ae8f3cf32ed4f5ce9.exe
    "C:\Users\Admin\AppData\Local\Temp\eb0a5411171e2858b32cc5eab75387f1c44b5e7d5df6597ae8f3cf32ed4f5ce9.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Maps connected drives based on registry
    • Checks processor information in registry
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1952
    • C:\Users\Admin\AppData\Local\Temp\eb0a5411171e2858b32cc5eab75387f1c44b5e7d5df6597ae8f3cf32ed4f5ce9 .exe
      "C:\Users\Admin\AppData\Local\Temp\eb0a5411171e2858b32cc5eab75387f1c44b5e7d5df6597ae8f3cf32ed4f5ce9 .exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:948
    • C:\Users\Admin\AppData\Roaming\IsedXuuwopm\evimr.exe
      C:\Users\Admin\AppData\Roaming\IsedXuuwopm\evimr.exe
      2⤵
      • Executes dropped EXE
      PID:1428
  • C:\Users\Admin\AppData\Roaming\IsedXuuwopm\evimr.exe
    C:\Users\Admin\AppData\Roaming\IsedXuuwopm\evimr.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2040 -s 44
      2⤵
      • Loads dropped DLL
      • Program crash
      PID:468

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\eb0a5411171e2858b32cc5eab75387f1c44b5e7d5df6597ae8f3cf32ed4f5ce9 .exe

    Filesize

    17.1MB

    MD5

    cbecf915dbea10364e418219ba02a651

    SHA1

    7e6cce8ae9ec5cf7031a63e1746a965a00076ab3

    SHA256

    17ec50dda2b146f7286e8aca2661789203e89170e6476286afc1da173991aabe

    SHA512

    911e9ae5b6848066403a93f28884769a9fe2eac40dcdc22badcae84491e6502ddee4c14591f962815e53f2048eed34f3c1e509e0d1bfbd255e3d91e4af3e2258

  • C:\Users\Admin\AppData\Local\Temp\eb0a5411171e2858b32cc5eab75387f1c44b5e7d5df6597ae8f3cf32ed4f5ce9 .exe

    Filesize

    17.1MB

    MD5

    cbecf915dbea10364e418219ba02a651

    SHA1

    7e6cce8ae9ec5cf7031a63e1746a965a00076ab3

    SHA256

    17ec50dda2b146f7286e8aca2661789203e89170e6476286afc1da173991aabe

    SHA512

    911e9ae5b6848066403a93f28884769a9fe2eac40dcdc22badcae84491e6502ddee4c14591f962815e53f2048eed34f3c1e509e0d1bfbd255e3d91e4af3e2258

  • C:\Users\Admin\AppData\Roaming\IsedXuuwopm\evimr.exe

    Filesize

    99KB

    MD5

    3f5f68332379473e40801bb6778a21d2

    SHA1

    42fdd270ca8055c2b97786c413ff0a61427daf5f

    SHA256

    aecc88ec789d00468da5614a67c751f205207746060431905f261296b84f7234

    SHA512

    39fdaec951ff35be639559e12021c0d0e8361ee191c4981cb1eec34ab338e8e2769bf9175b02511461c9abefdd66aba137d16b96d214cde4ff3096d27807184e

  • C:\Users\Admin\AppData\Roaming\IsedXuuwopm\evimr.exe

    Filesize

    99KB

    MD5

    3f5f68332379473e40801bb6778a21d2

    SHA1

    42fdd270ca8055c2b97786c413ff0a61427daf5f

    SHA256

    aecc88ec789d00468da5614a67c751f205207746060431905f261296b84f7234

    SHA512

    39fdaec951ff35be639559e12021c0d0e8361ee191c4981cb1eec34ab338e8e2769bf9175b02511461c9abefdd66aba137d16b96d214cde4ff3096d27807184e

  • C:\Users\Admin\AppData\Roaming\IsedXuuwopm\evimr.exe

    Filesize

    99KB

    MD5

    3f5f68332379473e40801bb6778a21d2

    SHA1

    42fdd270ca8055c2b97786c413ff0a61427daf5f

    SHA256

    aecc88ec789d00468da5614a67c751f205207746060431905f261296b84f7234

    SHA512

    39fdaec951ff35be639559e12021c0d0e8361ee191c4981cb1eec34ab338e8e2769bf9175b02511461c9abefdd66aba137d16b96d214cde4ff3096d27807184e

  • \Users\Admin\AppData\Local\Temp\eb0a5411171e2858b32cc5eab75387f1c44b5e7d5df6597ae8f3cf32ed4f5ce9 .exe

    Filesize

    17.1MB

    MD5

    cbecf915dbea10364e418219ba02a651

    SHA1

    7e6cce8ae9ec5cf7031a63e1746a965a00076ab3

    SHA256

    17ec50dda2b146f7286e8aca2661789203e89170e6476286afc1da173991aabe

    SHA512

    911e9ae5b6848066403a93f28884769a9fe2eac40dcdc22badcae84491e6502ddee4c14591f962815e53f2048eed34f3c1e509e0d1bfbd255e3d91e4af3e2258

  • \Users\Admin\AppData\Local\Temp\{3004069B-9D03-4D5A-9836-DC005CA9ACD3}\fpb.tmp

    Filesize

    503KB

    MD5

    3a34cf39fb84031f445e3c68b75fe75f

    SHA1

    f183e3650d711d7ec7f4d49dc3b60816500dc03c

    SHA256

    af73aa8c2dc89e156e6d1a435088ab63fe61d6a8346ad59798cc87bc7bbb2807

    SHA512

    a2ca316e097bac7b00f3c6707791487984f5f84a83221c1059b5454aaed5b25d9feebd450838fe6974162bace9fe4338fef15a68a549010e676d7fe86c63dbc2

  • \Users\Admin\AppData\Local\Temp\{60427045-46F3-4F36-9F38-6E37DD4DA429}\fpb.tmp

    Filesize

    835KB

    MD5

    84e63a75fe60db21ca4690683dfd7293

    SHA1

    326943796ae6c3cbb012b27f2c4f8f0d0b3f9b6b

    SHA256

    17915acdfaa0e1c0486c0164520bca64e419978d134c4172c756a91970f37cb4

    SHA512

    9164020af855125c598cc0a638be55658715697b0c9de7c1698cd1a140af6c31c233dd27cc2fe8f96365fecad70492058b6675cfa5d6be1fbce4ac37044c6ca5

  • \Users\Admin\AppData\Roaming\IsedXuuwopm\evimr.exe

    Filesize

    99KB

    MD5

    3f5f68332379473e40801bb6778a21d2

    SHA1

    42fdd270ca8055c2b97786c413ff0a61427daf5f

    SHA256

    aecc88ec789d00468da5614a67c751f205207746060431905f261296b84f7234

    SHA512

    39fdaec951ff35be639559e12021c0d0e8361ee191c4981cb1eec34ab338e8e2769bf9175b02511461c9abefdd66aba137d16b96d214cde4ff3096d27807184e

  • \Users\Admin\AppData\Roaming\IsedXuuwopm\evimr.exe

    Filesize

    99KB

    MD5

    3f5f68332379473e40801bb6778a21d2

    SHA1

    42fdd270ca8055c2b97786c413ff0a61427daf5f

    SHA256

    aecc88ec789d00468da5614a67c751f205207746060431905f261296b84f7234

    SHA512

    39fdaec951ff35be639559e12021c0d0e8361ee191c4981cb1eec34ab338e8e2769bf9175b02511461c9abefdd66aba137d16b96d214cde4ff3096d27807184e

  • \Users\Admin\AppData\Roaming\IsedXuuwopm\evimr.exe

    Filesize

    99KB

    MD5

    3f5f68332379473e40801bb6778a21d2

    SHA1

    42fdd270ca8055c2b97786c413ff0a61427daf5f

    SHA256

    aecc88ec789d00468da5614a67c751f205207746060431905f261296b84f7234

    SHA512

    39fdaec951ff35be639559e12021c0d0e8361ee191c4981cb1eec34ab338e8e2769bf9175b02511461c9abefdd66aba137d16b96d214cde4ff3096d27807184e

  • \Users\Admin\AppData\Roaming\IsedXuuwopm\evimr.exe

    Filesize

    99KB

    MD5

    3f5f68332379473e40801bb6778a21d2

    SHA1

    42fdd270ca8055c2b97786c413ff0a61427daf5f

    SHA256

    aecc88ec789d00468da5614a67c751f205207746060431905f261296b84f7234

    SHA512

    39fdaec951ff35be639559e12021c0d0e8361ee191c4981cb1eec34ab338e8e2769bf9175b02511461c9abefdd66aba137d16b96d214cde4ff3096d27807184e

  • \Users\Admin\AppData\Roaming\IsedXuuwopm\evimr.exe

    Filesize

    99KB

    MD5

    3f5f68332379473e40801bb6778a21d2

    SHA1

    42fdd270ca8055c2b97786c413ff0a61427daf5f

    SHA256

    aecc88ec789d00468da5614a67c751f205207746060431905f261296b84f7234

    SHA512

    39fdaec951ff35be639559e12021c0d0e8361ee191c4981cb1eec34ab338e8e2769bf9175b02511461c9abefdd66aba137d16b96d214cde4ff3096d27807184e

  • \Users\Admin\AppData\Roaming\IsedXuuwopm\evimr.exe

    Filesize

    99KB

    MD5

    3f5f68332379473e40801bb6778a21d2

    SHA1

    42fdd270ca8055c2b97786c413ff0a61427daf5f

    SHA256

    aecc88ec789d00468da5614a67c751f205207746060431905f261296b84f7234

    SHA512

    39fdaec951ff35be639559e12021c0d0e8361ee191c4981cb1eec34ab338e8e2769bf9175b02511461c9abefdd66aba137d16b96d214cde4ff3096d27807184e

  • memory/1952-55-0x0000000010000000-0x000000001003C000-memory.dmp

    Filesize

    240KB

  • memory/1952-54-0x0000000075E31000-0x0000000075E33000-memory.dmp

    Filesize

    8KB