Analysis
-
max time kernel
135s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2023, 17:50
Static task
static1
Behavioral task
behavioral1
Sample
e3eb8ce9ad0ef4679081ed2d7dea6e1d5c8af2fa521f7bc523a0c024214f5547.exe
Resource
win10v2004-20230220-en
General
-
Target
e3eb8ce9ad0ef4679081ed2d7dea6e1d5c8af2fa521f7bc523a0c024214f5547.exe
-
Size
7.0MB
-
MD5
aa5f0b1c1fd14b6ef99c5d604c770d13
-
SHA1
30a9eba953eb45032d22777dca0b3c84121cc0f3
-
SHA256
e3eb8ce9ad0ef4679081ed2d7dea6e1d5c8af2fa521f7bc523a0c024214f5547
-
SHA512
1860cb8a4df1959a84b5b768effe5161339b70eacffeb807eddb06bcbb90e98bd8787d3d858693632dc5475b032bcdb2e1878c144f7d6bbebe04b79cdbcb158f
-
SSDEEP
98304:IHZFvVY4xVF3S5BhXvUqQRNYOtgL+4jDwMMcQ3KjJa2pMg2kI09:l4z8538xa+iwMMcQala4OzW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5080 USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-EJA5.8.9.0.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Software\Microsoft\Windows\CurrentVersion\Run e3eb8ce9ad0ef4679081ed2d7dea6e1d5c8af2fa521f7bc523a0c024214f5547.exe Set value (str) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-EJA5.8.9.0 = "C:\\ProgramData\\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-EJA5.8.9.0\\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-EJA5.8.9.0.exe" e3eb8ce9ad0ef4679081ed2d7dea6e1d5c8af2fa521f7bc523a0c024214f5547.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4248 wrote to memory of 5080 4248 e3eb8ce9ad0ef4679081ed2d7dea6e1d5c8af2fa521f7bc523a0c024214f5547.exe 84 PID 4248 wrote to memory of 5080 4248 e3eb8ce9ad0ef4679081ed2d7dea6e1d5c8af2fa521f7bc523a0c024214f5547.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3eb8ce9ad0ef4679081ed2d7dea6e1d5c8af2fa521f7bc523a0c024214f5547.exe"C:\Users\Admin\AppData\Local\Temp\e3eb8ce9ad0ef4679081ed2d7dea6e1d5c8af2fa521f7bc523a0c024214f5547.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\ProgramData\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-EJA5.8.9.0\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-EJA5.8.9.0.exeC:\ProgramData\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-EJA5.8.9.0\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-EJA5.8.9.0.exe2⤵
- Executes dropped EXE
PID:5080
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-EJA5.8.9.0\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-EJA5.8.9.0.exe
Filesize757.0MB
MD5f980d3672f98c6933992fcaf0f98af6b
SHA15ced785823eacf7208665f7dde530cffcbdcbe83
SHA256e5fb06fb4dd16d6246d385ccce57a9380998cc3bc016a8491e9c48daf0bde612
SHA5128d095da191e69ceba1ca55463b07588a7b7182579445648bfbb6490895dc6c32f9b5c12a3333d25cc5de2564cc5e90f278c1d588603ab245711576a26dea2ab7
-
C:\ProgramData\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-EJA5.8.9.0\USOSharedMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38-EJA5.8.9.0.exe
Filesize757.0MB
MD5f980d3672f98c6933992fcaf0f98af6b
SHA15ced785823eacf7208665f7dde530cffcbdcbe83
SHA256e5fb06fb4dd16d6246d385ccce57a9380998cc3bc016a8491e9c48daf0bde612
SHA5128d095da191e69ceba1ca55463b07588a7b7182579445648bfbb6490895dc6c32f9b5c12a3333d25cc5de2564cc5e90f278c1d588603ab245711576a26dea2ab7