Overview
overview
10Static
static
10Endermanch...is.exe
windows7-x64
1Endermanch...is.exe
windows10-2004-x64
Endermanch...ug.exe
windows7-x64
6Endermanch...ug.exe
windows10-2004-x64
6Endermanch...ck.exe
windows7-x64
7Endermanch...ck.exe
windows10-2004-x64
7Endermanch...om.exe
windows7-x64
1Endermanch...om.exe
windows10-2004-x64
1Endermanch...le.exe
windows7-x64
1Endermanch...le.exe
windows10-2004-x64
1Endermanch...er.exe
windows7-x64
7Endermanch...er.exe
windows10-2004-x64
7Endermanch...er.exe
windows7-x64
7Endermanch...er.exe
windows10-2004-x64
7Endermanch...er.exe
windows7-x64
Endermanch...er.exe
windows10-2004-x64
Endermanch...us.exe
windows7-x64
1Endermanch...us.exe
windows10-2004-x64
1Endermanch....C.exe
windows7-x64
10Endermanch....C.exe
windows10-2004-x64
10Endermanch...rd.exe
windows7-x64
10Endermanch...rd.exe
windows10-2004-x64
9Endermanch...a2.exe
windows7-x64
1Endermanch...a2.exe
windows10-2004-x64
1Endermanch...19.exe
windows7-x64
7Endermanch...19.exe
windows10-2004-x64
7Endermanch...eg.exe
windows7-x64
7Endermanch...eg.exe
windows10-2004-x64
3Endermanch...1).exe
windows7-x64
3Endermanch...1).exe
windows10-2004-x64
3Endermanch...ld.exe
windows7-x64
3Endermanch...ld.exe
windows10-2004-x64
3Resubmissions
10-05-2024 16:25
240510-tw1h5shh47 1024-08-2023 11:16
230824-nda8msdf8z 1005-08-2023 22:52
230805-2tn2bsfa82 1024-07-2023 06:25
230724-g6s6laag35 1022-07-2023 15:57
230722-tee6wabg5w 1020-07-2023 23:19
230720-3bb5gsbf5v 1020-07-2023 23:06
230720-23f23sba63 1003-02-2021 11:43
210203-6bgge2nfan 1022-11-2020 06:42
201122-6x1at779dj 10Analysis
-
max time kernel
147s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
24-07-2023 06:25
Static task
static1
Behavioral task
behavioral1
Sample
Endermanch@CleanThis.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Endermanch@CleanThis.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
Endermanch@ColorBug.exe
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
Endermanch@ColorBug.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
Endermanch@DeriaLock.exe
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
Endermanch@DeriaLock.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
Endermanch@Deskbottom.exe
Resource
win7-20230712-en
Behavioral task
behavioral8
Sample
Endermanch@Deskbottom.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral9
Sample
Endermanch@DesktopPuzzle.exe
Resource
win7-20230712-en
Behavioral task
behavioral10
Sample
Endermanch@DesktopPuzzle.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral11
Sample
Endermanch@FakeAdwCleaner.exe
Resource
win7-20230712-en
Behavioral task
behavioral12
Sample
Endermanch@FakeAdwCleaner.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral13
Sample
Endermanch@FreeYoutubeDownloader.exe
Resource
win7-20230712-en
Behavioral task
behavioral14
Sample
Endermanch@FreeYoutubeDownloader.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral15
Sample
Endermanch@HMBlocker.exe
Resource
win7-20230712-en
Behavioral task
behavioral16
Sample
Endermanch@HMBlocker.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral17
Sample
Endermanch@HappyAntivirus.exe
Resource
win7-20230712-en
Behavioral task
behavioral18
Sample
Endermanch@HappyAntivirus.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral19
Sample
Endermanch@Illerka.C.exe
Resource
win7-20230712-en
Behavioral task
behavioral20
Sample
Endermanch@Illerka.C.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral21
Sample
Endermanch@InternetSecurityGuard.exe
Resource
win7-20230712-en
Behavioral task
behavioral22
Sample
Endermanch@InternetSecurityGuard.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral23
Sample
Endermanch@Koteyka2.exe
Resource
win7-20230712-en
Behavioral task
behavioral24
Sample
Endermanch@Koteyka2.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral25
Sample
Endermanch@LPS2019.exe
Resource
win7-20230712-en
Behavioral task
behavioral26
Sample
Endermanch@LPS2019.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral27
Sample
Endermanch@Movie.mpeg.exe
Resource
win7-20230712-en
Behavioral task
behavioral28
Sample
Endermanch@Movie.mpeg.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral29
Sample
Endermanch@NavaShield(1).exe
Resource
win7-20230712-en
Behavioral task
behavioral30
Sample
Endermanch@NavaShield(1).exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral31
Sample
Endermanch@NavaShield.exe
Resource
win7-20230712-en
Behavioral task
behavioral32
Sample
Endermanch@NavaShield.exe
Resource
win10v2004-20230703-en
General
-
Target
Endermanch@LPS2019.exe
-
Size
1.1MB
-
MD5
2eb3ce80b26345bd139f7378330b19c1
-
SHA1
10122bd8dd749e20c132d108d176794f140242b0
-
SHA256
8abed3ea04d52c42bdd6c9169c59212a7d8c649c12006b8278eda5aa91154cd2
-
SHA512
e3223cd07d59cd97893304a3632b3a66fd91635848160c33011c103cca2badbfe9b78fe258666b634e455872f3a98889ede5a425d8fae91cae6983da1ea1190a
-
SSDEEP
24576:pXhZgPlmWcA4Te9+g6+lET/+xRXKRwFSmjTGIWrwg:xInpSe99pCkRXKRMdGIWrN
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
lpsprt.exepid process 2932 lpsprt.exe -
Loads dropped DLL 4 IoCs
Processes:
Endermanch@LPS2019.exepid process 2160 Endermanch@LPS2019.exe 2160 Endermanch@LPS2019.exe 2160 Endermanch@LPS2019.exe 2160 Endermanch@LPS2019.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
lpsprt.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Windows\CurrentVersion\Run\SoftProz = "C:\\Program Files (x86)\\HjuTygFcvX\\lpsprt.exe" lpsprt.exe -
Drops file in Program Files directory 4 IoCs
Processes:
Endermanch@LPS2019.exedescription ioc process File opened for modification C:\Program Files (x86)\HjuTygFcvX Endermanch@LPS2019.exe File created C:\Program Files (x86)\HjuTygFcvX\__tmp_rar_sfx_access_check_259474949 Endermanch@LPS2019.exe File created C:\Program Files (x86)\HjuTygFcvX\lpsprt.exe Endermanch@LPS2019.exe File opened for modification C:\Program Files (x86)\HjuTygFcvX\lpsprt.exe Endermanch@LPS2019.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
lpsprt.exepid process 2932 lpsprt.exe 2932 lpsprt.exe 2932 lpsprt.exe 2932 lpsprt.exe 2932 lpsprt.exe 2932 lpsprt.exe 2932 lpsprt.exe 2932 lpsprt.exe 2932 lpsprt.exe 2932 lpsprt.exe 2932 lpsprt.exe 2932 lpsprt.exe 2932 lpsprt.exe 2932 lpsprt.exe 2932 lpsprt.exe 2932 lpsprt.exe 2932 lpsprt.exe 2932 lpsprt.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
lpsprt.exepid process 2932 lpsprt.exe 2932 lpsprt.exe 2932 lpsprt.exe 2932 lpsprt.exe 2932 lpsprt.exe 2932 lpsprt.exe 2932 lpsprt.exe 2932 lpsprt.exe 2932 lpsprt.exe 2932 lpsprt.exe 2932 lpsprt.exe 2932 lpsprt.exe 2932 lpsprt.exe 2932 lpsprt.exe 2932 lpsprt.exe 2932 lpsprt.exe 2932 lpsprt.exe 2932 lpsprt.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
Endermanch@LPS2019.exedescription pid process target process PID 2160 wrote to memory of 2932 2160 Endermanch@LPS2019.exe lpsprt.exe PID 2160 wrote to memory of 2932 2160 Endermanch@LPS2019.exe lpsprt.exe PID 2160 wrote to memory of 2932 2160 Endermanch@LPS2019.exe lpsprt.exe PID 2160 wrote to memory of 2932 2160 Endermanch@LPS2019.exe lpsprt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Endermanch@LPS2019.exe"C:\Users\Admin\AppData\Local\Temp\Endermanch@LPS2019.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\HjuTygFcvX\lpsprt.exe"C:\Program Files (x86)\HjuTygFcvX\lpsprt.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\HjuTygFcvX\lpsprt.exeFilesize
911KB
MD52e6360eeebcafd207ad6f4cfc81afdb3
SHA16d85d48c8c809ad0ee5f7b1b20ef79e871466072
SHA2563a31f386f4a68827d8cbfeb087c017f871d80ab4565a2266f692fbe6cfea9c3b
SHA51236e1cadeff91158c0e96585d7550dc193a6470f5fccf3cf98845c4291becc6dae39609771cc8157493bc6cb405446ac55a1790108c6c213293bf4a56ecf381e4
-
C:\Program Files (x86)\HjuTygFcvX\lpsprt.exeFilesize
911KB
MD52e6360eeebcafd207ad6f4cfc81afdb3
SHA16d85d48c8c809ad0ee5f7b1b20ef79e871466072
SHA2563a31f386f4a68827d8cbfeb087c017f871d80ab4565a2266f692fbe6cfea9c3b
SHA51236e1cadeff91158c0e96585d7550dc193a6470f5fccf3cf98845c4291becc6dae39609771cc8157493bc6cb405446ac55a1790108c6c213293bf4a56ecf381e4
-
C:\Program Files (x86)\HjuTygFcvX\lpsprt.exeFilesize
911KB
MD52e6360eeebcafd207ad6f4cfc81afdb3
SHA16d85d48c8c809ad0ee5f7b1b20ef79e871466072
SHA2563a31f386f4a68827d8cbfeb087c017f871d80ab4565a2266f692fbe6cfea9c3b
SHA51236e1cadeff91158c0e96585d7550dc193a6470f5fccf3cf98845c4291becc6dae39609771cc8157493bc6cb405446ac55a1790108c6c213293bf4a56ecf381e4
-
\Program Files (x86)\HjuTygFcvX\lpsprt.exeFilesize
911KB
MD52e6360eeebcafd207ad6f4cfc81afdb3
SHA16d85d48c8c809ad0ee5f7b1b20ef79e871466072
SHA2563a31f386f4a68827d8cbfeb087c017f871d80ab4565a2266f692fbe6cfea9c3b
SHA51236e1cadeff91158c0e96585d7550dc193a6470f5fccf3cf98845c4291becc6dae39609771cc8157493bc6cb405446ac55a1790108c6c213293bf4a56ecf381e4
-
\Program Files (x86)\HjuTygFcvX\lpsprt.exeFilesize
911KB
MD52e6360eeebcafd207ad6f4cfc81afdb3
SHA16d85d48c8c809ad0ee5f7b1b20ef79e871466072
SHA2563a31f386f4a68827d8cbfeb087c017f871d80ab4565a2266f692fbe6cfea9c3b
SHA51236e1cadeff91158c0e96585d7550dc193a6470f5fccf3cf98845c4291becc6dae39609771cc8157493bc6cb405446ac55a1790108c6c213293bf4a56ecf381e4
-
\Program Files (x86)\HjuTygFcvX\lpsprt.exeFilesize
911KB
MD52e6360eeebcafd207ad6f4cfc81afdb3
SHA16d85d48c8c809ad0ee5f7b1b20ef79e871466072
SHA2563a31f386f4a68827d8cbfeb087c017f871d80ab4565a2266f692fbe6cfea9c3b
SHA51236e1cadeff91158c0e96585d7550dc193a6470f5fccf3cf98845c4291becc6dae39609771cc8157493bc6cb405446ac55a1790108c6c213293bf4a56ecf381e4
-
\Program Files (x86)\HjuTygFcvX\lpsprt.exeFilesize
911KB
MD52e6360eeebcafd207ad6f4cfc81afdb3
SHA16d85d48c8c809ad0ee5f7b1b20ef79e871466072
SHA2563a31f386f4a68827d8cbfeb087c017f871d80ab4565a2266f692fbe6cfea9c3b
SHA51236e1cadeff91158c0e96585d7550dc193a6470f5fccf3cf98845c4291becc6dae39609771cc8157493bc6cb405446ac55a1790108c6c213293bf4a56ecf381e4
-
memory/2932-75-0x000000001B050000-0x000000001B1EC000-memory.dmpFilesize
1.6MB
-
memory/2932-79-0x000007FEF4780000-0x000007FEF511D000-memory.dmpFilesize
9.6MB
-
memory/2932-74-0x0000000001E70000-0x0000000001EF0000-memory.dmpFilesize
512KB
-
memory/2932-72-0x0000000000200000-0x0000000000220000-memory.dmpFilesize
128KB
-
memory/2932-76-0x000007FEF4780000-0x000007FEF511D000-memory.dmpFilesize
9.6MB
-
memory/2932-77-0x0000000001E70000-0x0000000001EF0000-memory.dmpFilesize
512KB
-
memory/2932-78-0x0000000001E70000-0x0000000001EF0000-memory.dmpFilesize
512KB
-
memory/2932-73-0x000007FEF4780000-0x000007FEF511D000-memory.dmpFilesize
9.6MB
-
memory/2932-80-0x0000000001E70000-0x0000000001EF0000-memory.dmpFilesize
512KB
-
memory/2932-81-0x000007FEF4780000-0x000007FEF511D000-memory.dmpFilesize
9.6MB
-
memory/2932-82-0x0000000001E70000-0x0000000001EF0000-memory.dmpFilesize
512KB
-
memory/2932-83-0x0000000001E70000-0x0000000001EF0000-memory.dmpFilesize
512KB
-
memory/2932-84-0x0000000001E70000-0x0000000001EF0000-memory.dmpFilesize
512KB
-
memory/2932-85-0x0000000001E70000-0x0000000001EF0000-memory.dmpFilesize
512KB