Overview
overview
10Static
static
10Endermanch...is.exe
windows7-x64
1Endermanch...is.exe
windows10-2004-x64
Endermanch...ug.exe
windows7-x64
6Endermanch...ug.exe
windows10-2004-x64
6Endermanch...ck.exe
windows7-x64
7Endermanch...ck.exe
windows10-2004-x64
7Endermanch...om.exe
windows7-x64
1Endermanch...om.exe
windows10-2004-x64
1Endermanch...le.exe
windows7-x64
1Endermanch...le.exe
windows10-2004-x64
1Endermanch...er.exe
windows7-x64
7Endermanch...er.exe
windows10-2004-x64
7Endermanch...er.exe
windows7-x64
7Endermanch...er.exe
windows10-2004-x64
7Endermanch...er.exe
windows7-x64
Endermanch...er.exe
windows10-2004-x64
Endermanch...us.exe
windows7-x64
1Endermanch...us.exe
windows10-2004-x64
1Endermanch....C.exe
windows7-x64
10Endermanch....C.exe
windows10-2004-x64
10Endermanch...rd.exe
windows7-x64
10Endermanch...rd.exe
windows10-2004-x64
9Endermanch...a2.exe
windows7-x64
1Endermanch...a2.exe
windows10-2004-x64
1Endermanch...19.exe
windows7-x64
7Endermanch...19.exe
windows10-2004-x64
7Endermanch...eg.exe
windows7-x64
7Endermanch...eg.exe
windows10-2004-x64
3Endermanch...1).exe
windows7-x64
3Endermanch...1).exe
windows10-2004-x64
3Endermanch...ld.exe
windows7-x64
3Endermanch...ld.exe
windows10-2004-x64
3Resubmissions
10-05-2024 16:25
240510-tw1h5shh47 1024-08-2023 11:16
230824-nda8msdf8z 1005-08-2023 22:52
230805-2tn2bsfa82 1024-07-2023 06:25
230724-g6s6laag35 1022-07-2023 15:57
230722-tee6wabg5w 1020-07-2023 23:19
230720-3bb5gsbf5v 1020-07-2023 23:06
230720-23f23sba63 1003-02-2021 11:43
210203-6bgge2nfan 1022-11-2020 06:42
201122-6x1at779dj 10Analysis
-
max time kernel
155s -
max time network
175s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
24-07-2023 06:25
Static task
static1
Behavioral task
behavioral1
Sample
Endermanch@CleanThis.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Endermanch@CleanThis.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
Endermanch@ColorBug.exe
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
Endermanch@ColorBug.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
Endermanch@DeriaLock.exe
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
Endermanch@DeriaLock.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
Endermanch@Deskbottom.exe
Resource
win7-20230712-en
Behavioral task
behavioral8
Sample
Endermanch@Deskbottom.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral9
Sample
Endermanch@DesktopPuzzle.exe
Resource
win7-20230712-en
Behavioral task
behavioral10
Sample
Endermanch@DesktopPuzzle.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral11
Sample
Endermanch@FakeAdwCleaner.exe
Resource
win7-20230712-en
Behavioral task
behavioral12
Sample
Endermanch@FakeAdwCleaner.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral13
Sample
Endermanch@FreeYoutubeDownloader.exe
Resource
win7-20230712-en
Behavioral task
behavioral14
Sample
Endermanch@FreeYoutubeDownloader.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral15
Sample
Endermanch@HMBlocker.exe
Resource
win7-20230712-en
Behavioral task
behavioral16
Sample
Endermanch@HMBlocker.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral17
Sample
Endermanch@HappyAntivirus.exe
Resource
win7-20230712-en
Behavioral task
behavioral18
Sample
Endermanch@HappyAntivirus.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral19
Sample
Endermanch@Illerka.C.exe
Resource
win7-20230712-en
Behavioral task
behavioral20
Sample
Endermanch@Illerka.C.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral21
Sample
Endermanch@InternetSecurityGuard.exe
Resource
win7-20230712-en
Behavioral task
behavioral22
Sample
Endermanch@InternetSecurityGuard.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral23
Sample
Endermanch@Koteyka2.exe
Resource
win7-20230712-en
Behavioral task
behavioral24
Sample
Endermanch@Koteyka2.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral25
Sample
Endermanch@LPS2019.exe
Resource
win7-20230712-en
Behavioral task
behavioral26
Sample
Endermanch@LPS2019.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral27
Sample
Endermanch@Movie.mpeg.exe
Resource
win7-20230712-en
Behavioral task
behavioral28
Sample
Endermanch@Movie.mpeg.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral29
Sample
Endermanch@NavaShield(1).exe
Resource
win7-20230712-en
Behavioral task
behavioral30
Sample
Endermanch@NavaShield(1).exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral31
Sample
Endermanch@NavaShield.exe
Resource
win7-20230712-en
Behavioral task
behavioral32
Sample
Endermanch@NavaShield.exe
Resource
win10v2004-20230703-en
General
-
Target
Endermanch@DeriaLock.exe
-
Size
484KB
-
MD5
0a7b70efba0aa93d4bc0857b87ac2fcb
-
SHA1
01a6c963b2f5f36ff21a1043587dcf921ae5f5cd
-
SHA256
4f5bff64160044d9a769ab277ff85ba954e2a2e182c6da4d0672790cf1d48309
-
SHA512
2033f9637b8d023242c93f54c140dd561592a3380a15a9fdc8ebfa33385ff4fc569d66c846a01b4ac005f0521b3c219e87f4b1ed2a83557f9d95fa066ad25e14
-
SSDEEP
6144:lqHKx3YCgy8HmmjJpnVhvLqCO3bLinIz1wASx:lqHoyHNj/nVhvLcyII
Malware Config
Signatures
-
Drops startup file 1 IoCs
Processes:
Endermanch@DeriaLock.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LOGON.exe Endermanch@DeriaLock.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Endermanch@DeriaLock.exepid process 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe 2540 Endermanch@DeriaLock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Endermanch@DeriaLock.exepid process 2540 Endermanch@DeriaLock.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Endermanch@DeriaLock.exedescription pid process Token: SeDebugPrivilege 2540 Endermanch@DeriaLock.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Endermanch@DeriaLock.exe"C:\Users\Admin\AppData\Local\Temp\Endermanch@DeriaLock.exe"1⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\explorer.exeexplorer.exe1⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2540-55-0x0000000074270000-0x000000007495E000-memory.dmpFilesize
6.9MB
-
memory/2540-54-0x00000000001D0000-0x0000000000252000-memory.dmpFilesize
520KB
-
memory/2540-56-0x0000000000350000-0x0000000000390000-memory.dmpFilesize
256KB
-
memory/2540-57-0x0000000000350000-0x0000000000390000-memory.dmpFilesize
256KB
-
memory/2540-188-0x0000000000350000-0x0000000000390000-memory.dmpFilesize
256KB
-
memory/2540-189-0x0000000074270000-0x000000007495E000-memory.dmpFilesize
6.9MB
-
memory/2540-190-0x0000000000350000-0x0000000000390000-memory.dmpFilesize
256KB