Analysis
-
max time kernel
204s -
max time network
245s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2022 17:53
Static task
static1
Behavioral task
behavioral1
Sample
9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe
Resource
win10v2004-20221111-en
General
-
Target
9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe
-
Size
422KB
-
MD5
6134ce5d2a2af878afbbf9874343d8eb
-
SHA1
6a8bde4b754f45a76f55fec8f52d6aab6b09fc94
-
SHA256
9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c
-
SHA512
e2101bb2ba458a893999870b82b0b3fedd434590dff61d8bdf6553f220f1425d4cba06986941d986ae46d22ecbd88a7d014b4a56346b099c055f2cc1eaac6dc0
-
SSDEEP
12288:p9feipGHJX1/clmkF0lJkvMAMkERLW4r9:LeipKJXW12k5MkElv9
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, C:\\ProgramData\\eP02401PoCiE02401\\eP02401PoCiE02401.exe" 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
eP02401PoCiE02401.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" eP02401PoCiE02401.exe -
Executes dropped EXE 1 IoCs
Processes:
eP02401PoCiE02401.exepid process 1844 eP02401PoCiE02401.exe -
Processes:
resource yara_rule behavioral2/memory/344-133-0x0000000000400000-0x00000000004D2000-memory.dmp upx behavioral2/memory/344-134-0x0000000000400000-0x00000000004D2000-memory.dmp upx behavioral2/memory/344-138-0x0000000000400000-0x00000000004D2000-memory.dmp upx behavioral2/memory/1844-139-0x0000000000400000-0x00000000004D2000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
eP02401PoCiE02401.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\eP02401PoCiE02401 = "C:\\ProgramData\\eP02401PoCiE02401\\eP02401PoCiE02401.exe" eP02401PoCiE02401.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4668 344 WerFault.exe 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 2236 1844 WerFault.exe eP02401PoCiE02401.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exepid process 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exeeP02401PoCiE02401.exedescription pid process Token: SeDebugPrivilege 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe Token: SeDebugPrivilege 1844 eP02401PoCiE02401.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
sihost.exesihost.exesihost.exesihost.exesihost.exepid process 3172 sihost.exe 3260 sihost.exe 4112 sihost.exe 3612 sihost.exe 4544 sihost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exedescription pid process target process PID 344 wrote to memory of 1844 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe eP02401PoCiE02401.exe PID 344 wrote to memory of 1844 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe eP02401PoCiE02401.exe PID 344 wrote to memory of 1844 344 9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe eP02401PoCiE02401.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe"C:\Users\Admin\AppData\Local\Temp\9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 344 -s 9082⤵
- Program crash
-
C:\ProgramData\eP02401PoCiE02401\eP02401PoCiE02401.exe"C:\ProgramData\eP02401PoCiE02401\eP02401PoCiE02401.exe" "C:\Users\Admin\AppData\Local\Temp\9474af72194adbf99dfe865caf940d249797bd49a770fd3aa6ca86ed6a44866c.exe"2⤵
- Modifies security service
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1844 -s 9043⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 344 -ip 3441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1844 -ip 18441⤵
-
C:\Windows\system32\sihost.exesihost.exe1⤵
-
C:\Windows\system32\sihost.exesihost.exe1⤵
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\sihost.exesihost.exe1⤵
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\sihost.exesihost.exe1⤵
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\sihost.exesihost.exe1⤵
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\sihost.exesihost.exe1⤵
- Suspicious use of FindShellTrayWindow
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\eP02401PoCiE02401\eP02401PoCiE02401.exeFilesize
422KB
MD532dff7ffc6d05b23e3f7b666d58f5cf7
SHA15649c1b1e63fbd80be8ecf0d191df96d67f6bfc9
SHA2568b66529e7f6b99d019de4bb23f2a35f7e2a45538e0897ea42bdc48dce2ee45de
SHA5121b222bf7001165e19b8c5722c26f8fd07db3bc58eb4ad4c302c3de80c152c5700020c8720fb55bb6d82473345359709b35f0558ef343a3f65bcefea7a528424d
-
C:\ProgramData\eP02401PoCiE02401\eP02401PoCiE02401.exeFilesize
422KB
MD532dff7ffc6d05b23e3f7b666d58f5cf7
SHA15649c1b1e63fbd80be8ecf0d191df96d67f6bfc9
SHA2568b66529e7f6b99d019de4bb23f2a35f7e2a45538e0897ea42bdc48dce2ee45de
SHA5121b222bf7001165e19b8c5722c26f8fd07db3bc58eb4ad4c302c3de80c152c5700020c8720fb55bb6d82473345359709b35f0558ef343a3f65bcefea7a528424d
-
memory/344-132-0x00000000007B0000-0x00000000007B3000-memory.dmpFilesize
12KB
-
memory/344-133-0x0000000000400000-0x00000000004D2000-memory.dmpFilesize
840KB
-
memory/344-134-0x0000000000400000-0x00000000004D2000-memory.dmpFilesize
840KB
-
memory/344-138-0x0000000000400000-0x00000000004D2000-memory.dmpFilesize
840KB
-
memory/1844-135-0x0000000000000000-mapping.dmp
-
memory/1844-139-0x0000000000400000-0x00000000004D2000-memory.dmpFilesize
840KB