Analysis

  • max time kernel
    146s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    16-08-2023 13:00

General

  • Target

    Ecesises.exe

  • Size

    563KB

  • MD5

    e2b6b68494a8efe3dcc6eb711bc7a2e9

  • SHA1

    ed38516bd865835abf0b07479494a2b1723d41e4

  • SHA256

    14384560101a2899411222cff1fc0dc0cd3afdfc1cc57e810c0adadd415157dc

  • SHA512

    b4cda8c0a49e9f346129c7fcf47e3f53a5c2626fd0095c3ba94b9ac56e0ad539b180187f480aa2515b3d8391f7e655cc1cd09b41dc7410f048ec16579ce0132d

  • SSDEEP

    12288:+BXPB4M54WaGqJ1YWXgsAgKDkvj90h79mi03O4fGgPO:s4MBaQWQsA/ovpuRm7O3

Score
10/10

Malware Config

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Checks QEMU agent file 2 TTPs 2 IoCs

    Checks presence of QEMU agent, possibly to detect virtualization.

  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Ecesises.exe
    "C:\Users\Admin\AppData\Local\Temp\Ecesises.exe"
    1⤵
    • Checks QEMU agent file
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2800
    • C:\Users\Admin\AppData\Local\Temp\Ecesises.exe
      "C:\Users\Admin\AppData\Local\Temp\Ecesises.exe"
      2⤵
      • Checks QEMU agent file
      • Suspicious use of NtCreateThreadExHideFromDebugger
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1332

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsy8805.tmp\System.dll

    Filesize

    11KB

    MD5

    ee260c45e97b62a5e42f17460d406068

    SHA1

    df35f6300a03c4d3d3bd69752574426296b78695

    SHA256

    e94a1f7bcd7e0d532b660d0af468eb3321536c3efdca265e61f9ec174b1aef27

    SHA512

    a98f350d17c9057f33e5847462a87d59cbf2aaeda7f6299b0d49bb455e484ce4660c12d2eb8c4a0d21df523e729222bbd6c820bf25b081bc7478152515b414b3

  • memory/1332-93-0x0000000001470000-0x0000000003F09000-memory.dmp

    Filesize

    42.6MB

  • memory/1332-68-0x0000000001470000-0x0000000003F09000-memory.dmp

    Filesize

    42.6MB

  • memory/1332-97-0x00000000342F0000-0x00000000345F3000-memory.dmp

    Filesize

    3.0MB

  • memory/1332-96-0x0000000000400000-0x0000000001462000-memory.dmp

    Filesize

    16.4MB

  • memory/1332-70-0x0000000000400000-0x0000000001462000-memory.dmp

    Filesize

    16.4MB

  • memory/1332-67-0x0000000000400000-0x0000000001462000-memory.dmp

    Filesize

    16.4MB

  • memory/1332-95-0x0000000000400000-0x0000000001462000-memory.dmp

    Filesize

    16.4MB

  • memory/1332-69-0x0000000077470000-0x0000000077619000-memory.dmp

    Filesize

    1.7MB

  • memory/1332-94-0x0000000000400000-0x0000000001462000-memory.dmp

    Filesize

    16.4MB

  • memory/1332-72-0x0000000001470000-0x0000000003F09000-memory.dmp

    Filesize

    42.6MB

  • memory/1332-92-0x0000000000400000-0x0000000001462000-memory.dmp

    Filesize

    16.4MB

  • memory/2800-62-0x0000000002EF0000-0x0000000005989000-memory.dmp

    Filesize

    42.6MB

  • memory/2800-66-0x0000000010000000-0x0000000010006000-memory.dmp

    Filesize

    24KB

  • memory/2800-63-0x0000000002EF0000-0x0000000005989000-memory.dmp

    Filesize

    42.6MB

  • memory/2800-65-0x0000000077660000-0x0000000077736000-memory.dmp

    Filesize

    856KB

  • memory/2800-64-0x0000000077470000-0x0000000077619000-memory.dmp

    Filesize

    1.7MB