Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2023 04:49
Static task
static1
Behavioral task
behavioral1
Sample
eee.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
eee.exe
Resource
win10v2004-20230915-en
General
-
Target
eee.exe
-
Size
3.3MB
-
MD5
0f188231c29fba40e8b3e76792464cff
-
SHA1
e231f8e1060915dcb83fcf383ce0c80dbb94b2ea
-
SHA256
690e898fd01b69ac3eea36ac0bde48295eeb37b85a76ab96368b02dd7ee51615
-
SHA512
2d430c8bc5d5473bcc41e22bff252f1c09e632a4baaa5da4ac011ba13bf102ccc7a80541293a965a6ff80ca47b3d4271fd1e35c878a2b4ff0123af172f16f803
-
SSDEEP
98304:sqNAQ6FGtvX6KN5hBAud6kDjGpUefle0GzDKKD:sqN5u06KN5hZnse0GzJ
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1788 set thread context of 2688 1788 eee.exe 88 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1788 eee.exe 2688 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1788 eee.exe 2688 cmd.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1788 wrote to memory of 2688 1788 eee.exe 88 PID 1788 wrote to memory of 2688 1788 eee.exe 88 PID 1788 wrote to memory of 2688 1788 eee.exe 88 PID 1788 wrote to memory of 2688 1788 eee.exe 88 PID 2688 wrote to memory of 1972 2688 cmd.exe 100 PID 2688 wrote to memory of 1972 2688 cmd.exe 100 PID 2688 wrote to memory of 1972 2688 cmd.exe 100 PID 2688 wrote to memory of 1972 2688 cmd.exe 100 PID 2688 wrote to memory of 1972 2688 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\eee.exe"C:\Users\Admin\AppData\Local\Temp\eee.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵PID:1972
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD553a178af0c2233171e4f5ed3b395c73b
SHA1cf1c578749120d3fa03135a639e2a86788181ef0
SHA25624a5c7d4ddbdfbd6e1bc70fd15dde1bb71378f5169c39b1c5347c85218beb15b
SHA512525af32a4ec2c107dcf93c3ed651ac001d7509c7c70347664aa5896edebfc970a3abfc9c85c3a7191ad2b43e50f05669407e72525b01ca6bc9878c066fd86eaf