Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
09-10-2023 03:22
Behavioral task
behavioral1
Sample
ebc0a23966c792adccd685ca6b844ddfdd41cf5c618cd8bc20eac34cea9358b7.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ebc0a23966c792adccd685ca6b844ddfdd41cf5c618cd8bc20eac34cea9358b7.exe
Resource
win10v2004-20230915-en
General
-
Target
ebc0a23966c792adccd685ca6b844ddfdd41cf5c618cd8bc20eac34cea9358b7.exe
-
Size
12.4MB
-
MD5
cf53d66004b4c6ab45fb4a80a2f0f775
-
SHA1
5bc0e3a99580f6d290ae961b5ade47ac51994980
-
SHA256
ebc0a23966c792adccd685ca6b844ddfdd41cf5c618cd8bc20eac34cea9358b7
-
SHA512
eb9603551596469e207fdbd2e03c09c8a984f3c2569cd1bc28eda710a77a65fa28cecbeeebf7ecfdbddeb36ae702f4147720e3d8e52c3f9c4270034b90594e44
-
SSDEEP
393216:/ZaOtcKNdpN8+8QFV2Vr5sjqQNRvv40TFV2F/5lL3Y:/PjFNn86IlTQNRJWjL3Y
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2756 Uninstall64.exe -
Loads dropped DLL 1 IoCs
pid Process 1712 ebc0a23966c792adccd685ca6b844ddfdd41cf5c618cd8bc20eac34cea9358b7.exe -
resource yara_rule behavioral1/memory/1712-4-0x000000013F090000-0x00000001407BF000-memory.dmp vmprotect behavioral1/memory/1712-37-0x000000013F090000-0x00000001407BF000-memory.dmp vmprotect behavioral1/memory/2756-51-0x0000000180000000-0x0000000180E67000-memory.dmp vmprotect behavioral1/memory/2756-56-0x0000000180000000-0x0000000180E67000-memory.dmp vmprotect behavioral1/memory/2756-62-0x0000000180000000-0x0000000180E67000-memory.dmp vmprotect behavioral1/memory/1712-65-0x000000013F090000-0x00000001407BF000-memory.dmp vmprotect behavioral1/memory/2756-67-0x0000000180000000-0x0000000180E67000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1712 ebc0a23966c792adccd685ca6b844ddfdd41cf5c618cd8bc20eac34cea9358b7.exe 1712 ebc0a23966c792adccd685ca6b844ddfdd41cf5c618cd8bc20eac34cea9358b7.exe 1712 ebc0a23966c792adccd685ca6b844ddfdd41cf5c618cd8bc20eac34cea9358b7.exe 1712 ebc0a23966c792adccd685ca6b844ddfdd41cf5c618cd8bc20eac34cea9358b7.exe 1712 ebc0a23966c792adccd685ca6b844ddfdd41cf5c618cd8bc20eac34cea9358b7.exe 1712 ebc0a23966c792adccd685ca6b844ddfdd41cf5c618cd8bc20eac34cea9358b7.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2756 Uninstall64.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2756 1712 ebc0a23966c792adccd685ca6b844ddfdd41cf5c618cd8bc20eac34cea9358b7.exe 28 PID 1712 wrote to memory of 2756 1712 ebc0a23966c792adccd685ca6b844ddfdd41cf5c618cd8bc20eac34cea9358b7.exe 28 PID 1712 wrote to memory of 2756 1712 ebc0a23966c792adccd685ca6b844ddfdd41cf5c618cd8bc20eac34cea9358b7.exe 28 PID 1712 wrote to memory of 2756 1712 ebc0a23966c792adccd685ca6b844ddfdd41cf5c618cd8bc20eac34cea9358b7.exe 28 PID 1712 wrote to memory of 2756 1712 ebc0a23966c792adccd685ca6b844ddfdd41cf5c618cd8bc20eac34cea9358b7.exe 28 PID 1712 wrote to memory of 2756 1712 ebc0a23966c792adccd685ca6b844ddfdd41cf5c618cd8bc20eac34cea9358b7.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebc0a23966c792adccd685ca6b844ddfdd41cf5c618cd8bc20eac34cea9358b7.exe"C:\Users\Admin\AppData\Local\Temp\ebc0a23966c792adccd685ca6b844ddfdd41cf5c618cd8bc20eac34cea9358b7.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\Uninstall64.exeC:\Users\Admin\AppData\Local\Temp\Uninstall64.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2756
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
489KB
MD5cc8d09544f0a963fbc81c24b2237870e
SHA1c5a2e59803feec165641c4253ed7471ba38e28d5
SHA256654573bf549cc532b4d43dc4af95c4363e7f2843fc01c74367d3dc9adf42522a
SHA512c5ca3f232e978efab948c60bfdc47318f7bc5db991adf76183f427814078bbc04244d75f3945eca39c78bcda5809f5f175eb8187b18b724f697d6adfc2ada220
-
Filesize
489KB
MD5cc8d09544f0a963fbc81c24b2237870e
SHA1c5a2e59803feec165641c4253ed7471ba38e28d5
SHA256654573bf549cc532b4d43dc4af95c4363e7f2843fc01c74367d3dc9adf42522a
SHA512c5ca3f232e978efab948c60bfdc47318f7bc5db991adf76183f427814078bbc04244d75f3945eca39c78bcda5809f5f175eb8187b18b724f697d6adfc2ada220
-
Filesize
489KB
MD5cc8d09544f0a963fbc81c24b2237870e
SHA1c5a2e59803feec165641c4253ed7471ba38e28d5
SHA256654573bf549cc532b4d43dc4af95c4363e7f2843fc01c74367d3dc9adf42522a
SHA512c5ca3f232e978efab948c60bfdc47318f7bc5db991adf76183f427814078bbc04244d75f3945eca39c78bcda5809f5f175eb8187b18b724f697d6adfc2ada220