Analysis
-
max time kernel
152s -
max time network
165s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 00:20
Static task
static1
Behavioral task
behavioral1
Sample
618b66ebd98be503e3a0521f1f96a609d8338f800d65877f258ec6340023e287.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
618b66ebd98be503e3a0521f1f96a609d8338f800d65877f258ec6340023e287.exe
Resource
win10v2004-20220812-en
General
-
Target
618b66ebd98be503e3a0521f1f96a609d8338f800d65877f258ec6340023e287.exe
-
Size
321KB
-
MD5
fc272ce7fefc350db5727354e39dd423
-
SHA1
1327d500a09bc115b2b7caac85b1b74f06dc2ef8
-
SHA256
618b66ebd98be503e3a0521f1f96a609d8338f800d65877f258ec6340023e287
-
SHA512
d84c09f15b991e79c342ee4411f4137bb65ae9779d266680df841494ba5ceeb15d17d7fa3b2ca691322763d22a4d35b97c6f165779a65ddf0239c2fdfa321bec
-
SSDEEP
3072:lNQftfClRajNsEYXFBZU1HJAPCXjUeJs2raRLoO7mbD7R9nIxF+l6qFUT+aqNV40:lNatAaz68H0Kp24aX7Sp9nkF+oTuEjET
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1612 epbue.exe -
Deletes itself 1 IoCs
pid Process 1004 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1348 618b66ebd98be503e3a0521f1f96a609d8338f800d65877f258ec6340023e287.exe 1348 618b66ebd98be503e3a0521f1f96a609d8338f800d65877f258ec6340023e287.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\Currentversion\Run epbue.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\Dymylicaob = "C:\\Users\\Admin\\AppData\\Roaming\\Taeq\\epbue.exe" epbue.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\Currentversion\Run epbue.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1348 set thread context of 1004 1348 618b66ebd98be503e3a0521f1f96a609d8338f800d65877f258ec6340023e287.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Privacy 618b66ebd98be503e3a0521f1f96a609d8338f800d65877f258ec6340023e287.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 618b66ebd98be503e3a0521f1f96a609d8338f800d65877f258ec6340023e287.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\2FA60522-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe 1612 epbue.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeSecurityPrivilege 1348 618b66ebd98be503e3a0521f1f96a609d8338f800d65877f258ec6340023e287.exe Token: SeSecurityPrivilege 1348 618b66ebd98be503e3a0521f1f96a609d8338f800d65877f258ec6340023e287.exe Token: SeSecurityPrivilege 1348 618b66ebd98be503e3a0521f1f96a609d8338f800d65877f258ec6340023e287.exe Token: SeSecurityPrivilege 1348 618b66ebd98be503e3a0521f1f96a609d8338f800d65877f258ec6340023e287.exe Token: SeSecurityPrivilege 1348 618b66ebd98be503e3a0521f1f96a609d8338f800d65877f258ec6340023e287.exe Token: SeSecurityPrivilege 1004 cmd.exe Token: SeSecurityPrivilege 1004 cmd.exe Token: SeSecurityPrivilege 1004 cmd.exe Token: SeSecurityPrivilege 1004 cmd.exe Token: SeSecurityPrivilege 1004 cmd.exe Token: SeSecurityPrivilege 1004 cmd.exe Token: SeSecurityPrivilege 1004 cmd.exe Token: SeSecurityPrivilege 1004 cmd.exe Token: SeManageVolumePrivilege 848 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 848 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 848 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 848 WinMail.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1348 618b66ebd98be503e3a0521f1f96a609d8338f800d65877f258ec6340023e287.exe 1612 epbue.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1348 wrote to memory of 1612 1348 618b66ebd98be503e3a0521f1f96a609d8338f800d65877f258ec6340023e287.exe 28 PID 1348 wrote to memory of 1612 1348 618b66ebd98be503e3a0521f1f96a609d8338f800d65877f258ec6340023e287.exe 28 PID 1348 wrote to memory of 1612 1348 618b66ebd98be503e3a0521f1f96a609d8338f800d65877f258ec6340023e287.exe 28 PID 1348 wrote to memory of 1612 1348 618b66ebd98be503e3a0521f1f96a609d8338f800d65877f258ec6340023e287.exe 28 PID 1612 wrote to memory of 1124 1612 epbue.exe 18 PID 1612 wrote to memory of 1124 1612 epbue.exe 18 PID 1612 wrote to memory of 1124 1612 epbue.exe 18 PID 1612 wrote to memory of 1124 1612 epbue.exe 18 PID 1612 wrote to memory of 1124 1612 epbue.exe 18 PID 1612 wrote to memory of 1192 1612 epbue.exe 17 PID 1612 wrote to memory of 1192 1612 epbue.exe 17 PID 1612 wrote to memory of 1192 1612 epbue.exe 17 PID 1612 wrote to memory of 1192 1612 epbue.exe 17 PID 1612 wrote to memory of 1192 1612 epbue.exe 17 PID 1612 wrote to memory of 1268 1612 epbue.exe 16 PID 1612 wrote to memory of 1268 1612 epbue.exe 16 PID 1612 wrote to memory of 1268 1612 epbue.exe 16 PID 1612 wrote to memory of 1268 1612 epbue.exe 16 PID 1612 wrote to memory of 1268 1612 epbue.exe 16 PID 1612 wrote to memory of 1348 1612 epbue.exe 25 PID 1612 wrote to memory of 1348 1612 epbue.exe 25 PID 1612 wrote to memory of 1348 1612 epbue.exe 25 PID 1612 wrote to memory of 1348 1612 epbue.exe 25 PID 1612 wrote to memory of 1348 1612 epbue.exe 25 PID 1348 wrote to memory of 1004 1348 618b66ebd98be503e3a0521f1f96a609d8338f800d65877f258ec6340023e287.exe 29 PID 1348 wrote to memory of 1004 1348 618b66ebd98be503e3a0521f1f96a609d8338f800d65877f258ec6340023e287.exe 29 PID 1348 wrote to memory of 1004 1348 618b66ebd98be503e3a0521f1f96a609d8338f800d65877f258ec6340023e287.exe 29 PID 1348 wrote to memory of 1004 1348 618b66ebd98be503e3a0521f1f96a609d8338f800d65877f258ec6340023e287.exe 29 PID 1348 wrote to memory of 1004 1348 618b66ebd98be503e3a0521f1f96a609d8338f800d65877f258ec6340023e287.exe 29 PID 1348 wrote to memory of 1004 1348 618b66ebd98be503e3a0521f1f96a609d8338f800d65877f258ec6340023e287.exe 29 PID 1348 wrote to memory of 1004 1348 618b66ebd98be503e3a0521f1f96a609d8338f800d65877f258ec6340023e287.exe 29 PID 1348 wrote to memory of 1004 1348 618b66ebd98be503e3a0521f1f96a609d8338f800d65877f258ec6340023e287.exe 29 PID 1348 wrote to memory of 1004 1348 618b66ebd98be503e3a0521f1f96a609d8338f800d65877f258ec6340023e287.exe 29 PID 1612 wrote to memory of 1668 1612 epbue.exe 30 PID 1612 wrote to memory of 1668 1612 epbue.exe 30 PID 1612 wrote to memory of 1668 1612 epbue.exe 30 PID 1612 wrote to memory of 1668 1612 epbue.exe 30 PID 1612 wrote to memory of 1668 1612 epbue.exe 30 PID 1612 wrote to memory of 1104 1612 epbue.exe 31 PID 1612 wrote to memory of 1104 1612 epbue.exe 31 PID 1612 wrote to memory of 1104 1612 epbue.exe 31 PID 1612 wrote to memory of 1104 1612 epbue.exe 31 PID 1612 wrote to memory of 1104 1612 epbue.exe 31 PID 1612 wrote to memory of 848 1612 epbue.exe 32 PID 1612 wrote to memory of 848 1612 epbue.exe 32 PID 1612 wrote to memory of 848 1612 epbue.exe 32 PID 1612 wrote to memory of 848 1612 epbue.exe 32 PID 1612 wrote to memory of 848 1612 epbue.exe 32 PID 1612 wrote to memory of 1088 1612 epbue.exe 33 PID 1612 wrote to memory of 1088 1612 epbue.exe 33 PID 1612 wrote to memory of 1088 1612 epbue.exe 33 PID 1612 wrote to memory of 1088 1612 epbue.exe 33 PID 1612 wrote to memory of 1088 1612 epbue.exe 33 PID 1612 wrote to memory of 1596 1612 epbue.exe 34 PID 1612 wrote to memory of 1596 1612 epbue.exe 34 PID 1612 wrote to memory of 1596 1612 epbue.exe 34 PID 1612 wrote to memory of 1596 1612 epbue.exe 34 PID 1612 wrote to memory of 1596 1612 epbue.exe 34 PID 1612 wrote to memory of 1592 1612 epbue.exe 35 PID 1612 wrote to memory of 1592 1612 epbue.exe 35 PID 1612 wrote to memory of 1592 1612 epbue.exe 35 PID 1612 wrote to memory of 1592 1612 epbue.exe 35 PID 1612 wrote to memory of 1592 1612 epbue.exe 35 PID 1612 wrote to memory of 856 1612 epbue.exe 36
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\618b66ebd98be503e3a0521f1f96a609d8338f800d65877f258ec6340023e287.exe"C:\Users\Admin\AppData\Local\Temp\618b66ebd98be503e3a0521f1f96a609d8338f800d65877f258ec6340023e287.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Roaming\Taeq\epbue.exe"C:\Users\Admin\AppData\Roaming\Taeq\epbue.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1612
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp9a0716ef.bat"3⤵
- Deletes itself
- Suspicious use of AdjustPrivilegeToken
PID:1004
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1192
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1124
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1668
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1859174906-6570579231492835977-18459092971135926192-177466481660024591-773999302"1⤵PID:1104
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:848
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1088
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1596
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1592
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:856
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD587e7283860b6530f6abfa25b99c69d28
SHA1e3608a4f91d2fdf46076bac5483843602628bbe1
SHA256a3f7e57786e731d4ebe8adca291dcbd98a6d099b2f9490275c22dfa6ceff2f33
SHA512a9ceac914754b33272ec822009abe7eb729a161282d2b688ec520d3c40702a98b78d8782808c34e65116194214f56fc37d3a13227dc3eaf02bc44014a04f88f1
-
Filesize
321KB
MD536a229705cfe5a296dd6d9d1f4abe872
SHA1be84b4aa013979d28991f5f33dd578ac4d33325c
SHA256a4584ea7006c1ed845f0f8352aa96b465d72bc25d0cb09c0a831e4b48fe2f465
SHA5129ad255cd2c5ff6bb6b8ec2514e47d47357a31fc3bb249f6ab066a1f9b55079e24377735ab1749f72cad816aaad01382236520a393e33c7cf83b4b150ab99f84b
-
Filesize
321KB
MD536a229705cfe5a296dd6d9d1f4abe872
SHA1be84b4aa013979d28991f5f33dd578ac4d33325c
SHA256a4584ea7006c1ed845f0f8352aa96b465d72bc25d0cb09c0a831e4b48fe2f465
SHA5129ad255cd2c5ff6bb6b8ec2514e47d47357a31fc3bb249f6ab066a1f9b55079e24377735ab1749f72cad816aaad01382236520a393e33c7cf83b4b150ab99f84b
-
Filesize
421B
MD5d5e5330ccf42fdc487aa8f8bc95ff4ec
SHA1f1a2faa1c839a0e436fc7a6e21b3a5e98e705c46
SHA256631c5503ac1e9992cd5582d9f91b01ef51bc00dee25046dc3323215cdb8297ee
SHA512f6df9c9773e1f1b7496b2c044d321254d62fa802af8a85e7232768e2b37c5c96a62ece10b5a4859dd3ec9b5df2706c9977e199af266513fd8f2c2206cb368aaf
-
Filesize
3KB
MD5aacaf4660d16886e4288b9c3fb25194c
SHA17c63f5cbf2e107d9179280c91531a880b6f232ad
SHA2567e4a6665542dd58099f562c5daea420bb7df15bb8a7ab563ae22c5806818f00f
SHA51206cbd1547c99b2ad97d9d34eb43887c8e7e90e7ab2b9070750d502f9b0afa0901692f2406d9ca8cf82fe5d8b5073c2a60ab12119faf91fc24d0048721aa0d929
-
Filesize
321KB
MD536a229705cfe5a296dd6d9d1f4abe872
SHA1be84b4aa013979d28991f5f33dd578ac4d33325c
SHA256a4584ea7006c1ed845f0f8352aa96b465d72bc25d0cb09c0a831e4b48fe2f465
SHA5129ad255cd2c5ff6bb6b8ec2514e47d47357a31fc3bb249f6ab066a1f9b55079e24377735ab1749f72cad816aaad01382236520a393e33c7cf83b4b150ab99f84b
-
Filesize
321KB
MD536a229705cfe5a296dd6d9d1f4abe872
SHA1be84b4aa013979d28991f5f33dd578ac4d33325c
SHA256a4584ea7006c1ed845f0f8352aa96b465d72bc25d0cb09c0a831e4b48fe2f465
SHA5129ad255cd2c5ff6bb6b8ec2514e47d47357a31fc3bb249f6ab066a1f9b55079e24377735ab1749f72cad816aaad01382236520a393e33c7cf83b4b150ab99f84b