Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2023 17:31

General

  • Target

    ae7060c5601894ec5c50d229ea5417ec.exe

  • Size

    397KB

  • MD5

    ae7060c5601894ec5c50d229ea5417ec

  • SHA1

    b338a8e8a6cedfca7ad0432d766604138d481735

  • SHA256

    40d0636d3ec2287a07009b05a8bd7d4143b6cbb35eba9c23d9cfd239c8f9c575

  • SHA512

    460944302255efc6150b7aea46748f75229ccd21cd868a4c15046c23b9c59eac0beb7d2d03353bb51e205489f6b10a435efd2ba464ec7cd61bc03aa33f072982

  • SSDEEP

    6144:XBlL/0F6wKv62AYP9ke+uyJEEp2XnnE8qP2QOyCwT3yLmMgu9cWdq1bj8HyxOf:R26y2AE9kb59qnE8YlxTogn91bj8Hpf

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1380
    • C:\Users\Admin\AppData\Local\Temp\ae7060c5601894ec5c50d229ea5417ec.exe
      "C:\Users\Admin\AppData\Local\Temp\ae7060c5601894ec5c50d229ea5417ec.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1140
      • C:\Users\Admin\AppData\Local\Temp\eonlnq.exe
        "C:\Users\Admin\AppData\Local\Temp\eonlnq.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1872
        • C:\Users\Admin\AppData\Local\Temp\eonlnq.exe
          "C:\Users\Admin\AppData\Local\Temp\eonlnq.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          PID:2768
    • C:\Windows\SysWOW64\typeperf.exe
      "C:\Windows\SysWOW64\typeperf.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2512
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:2804

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\eonlnq.exe

      Filesize

      198KB

      MD5

      71fd33b199315633dc232fa06c7e94a8

      SHA1

      cdef7d1016f8a058430d5f778a9e4de8760acc5b

      SHA256

      e49ad42b1f8c0cdfe8843ba366ff3edbf42c3e11bfb747a847e78230dfe8e202

      SHA512

      e80e3bec218b13c975bb953e4c1e0665f33da9699e42167a7b5b9b13e3d14d64394b83da722f304b771587e515b1a9619da28d2df8e62b7ba90e64291d4ac60f

    • C:\Users\Admin\AppData\Local\Temp\eonlnq.exe

      Filesize

      198KB

      MD5

      71fd33b199315633dc232fa06c7e94a8

      SHA1

      cdef7d1016f8a058430d5f778a9e4de8760acc5b

      SHA256

      e49ad42b1f8c0cdfe8843ba366ff3edbf42c3e11bfb747a847e78230dfe8e202

      SHA512

      e80e3bec218b13c975bb953e4c1e0665f33da9699e42167a7b5b9b13e3d14d64394b83da722f304b771587e515b1a9619da28d2df8e62b7ba90e64291d4ac60f

    • C:\Users\Admin\AppData\Local\Temp\eonlnq.exe

      Filesize

      198KB

      MD5

      71fd33b199315633dc232fa06c7e94a8

      SHA1

      cdef7d1016f8a058430d5f778a9e4de8760acc5b

      SHA256

      e49ad42b1f8c0cdfe8843ba366ff3edbf42c3e11bfb747a847e78230dfe8e202

      SHA512

      e80e3bec218b13c975bb953e4c1e0665f33da9699e42167a7b5b9b13e3d14d64394b83da722f304b771587e515b1a9619da28d2df8e62b7ba90e64291d4ac60f

    • C:\Users\Admin\AppData\Local\Temp\eonlnq.exe

      Filesize

      198KB

      MD5

      71fd33b199315633dc232fa06c7e94a8

      SHA1

      cdef7d1016f8a058430d5f778a9e4de8760acc5b

      SHA256

      e49ad42b1f8c0cdfe8843ba366ff3edbf42c3e11bfb747a847e78230dfe8e202

      SHA512

      e80e3bec218b13c975bb953e4c1e0665f33da9699e42167a7b5b9b13e3d14d64394b83da722f304b771587e515b1a9619da28d2df8e62b7ba90e64291d4ac60f

    • C:\Users\Admin\AppData\Local\Temp\rvvpgjkh.zip

      Filesize

      430KB

      MD5

      30a561abb006b9d5debdd51dab743700

      SHA1

      e19c8d436f5b6ed66db21e32020f5ab6406241ca

      SHA256

      62da7ad6252a7778f096d62d9485a97ac48f2f2d0258cecd471aaada98877fe2

      SHA512

      e48b51bb99083c7e9fd55e28c9c667bf9c6c7141c1b620ce71542849bfed53a92585897321831743e80a8eea3ac0c787ab091f742bf58b587a5e50f723443c53

    • C:\Users\Admin\AppData\Local\Temp\xjsdlmxhwc.r

      Filesize

      264KB

      MD5

      5b765832505ddedac0f3c42b0dad5ec1

      SHA1

      921ff22da17ea1c6faf2a244b967091bebcda247

      SHA256

      12b51eb60f268062485c366598e05e2af9c8c5d409f11c752545d49dc64a02af

      SHA512

      5e97557abfae4d300f42048efa7c18b12e841bae164300472ce22e2d43360649f835994696b11e4988b6ff616d7d170ef3bf0c366e16fb8e8d69f9ab61e4771a

    • \Users\Admin\AppData\Local\Temp\eonlnq.exe

      Filesize

      198KB

      MD5

      71fd33b199315633dc232fa06c7e94a8

      SHA1

      cdef7d1016f8a058430d5f778a9e4de8760acc5b

      SHA256

      e49ad42b1f8c0cdfe8843ba366ff3edbf42c3e11bfb747a847e78230dfe8e202

      SHA512

      e80e3bec218b13c975bb953e4c1e0665f33da9699e42167a7b5b9b13e3d14d64394b83da722f304b771587e515b1a9619da28d2df8e62b7ba90e64291d4ac60f

    • \Users\Admin\AppData\Local\Temp\eonlnq.exe

      Filesize

      198KB

      MD5

      71fd33b199315633dc232fa06c7e94a8

      SHA1

      cdef7d1016f8a058430d5f778a9e4de8760acc5b

      SHA256

      e49ad42b1f8c0cdfe8843ba366ff3edbf42c3e11bfb747a847e78230dfe8e202

      SHA512

      e80e3bec218b13c975bb953e4c1e0665f33da9699e42167a7b5b9b13e3d14d64394b83da722f304b771587e515b1a9619da28d2df8e62b7ba90e64291d4ac60f

    • \Users\Admin\AppData\Local\Temp\eonlnq.exe

      Filesize

      198KB

      MD5

      71fd33b199315633dc232fa06c7e94a8

      SHA1

      cdef7d1016f8a058430d5f778a9e4de8760acc5b

      SHA256

      e49ad42b1f8c0cdfe8843ba366ff3edbf42c3e11bfb747a847e78230dfe8e202

      SHA512

      e80e3bec218b13c975bb953e4c1e0665f33da9699e42167a7b5b9b13e3d14d64394b83da722f304b771587e515b1a9619da28d2df8e62b7ba90e64291d4ac60f

    • \Users\Admin\AppData\Local\Temp\sqlite3.dll

      Filesize

      820KB

      MD5

      317ba2f8e624ec0c7d3714e2bde4f346

      SHA1

      12734675cfad66d78252515644a624964f69f94d

      SHA256

      0c2093493424e885c297d613e0cf343d8a084253ca3b044415e14c6e94696877

      SHA512

      ecc4a6f951cd7958288b7de35b253475fcc0910f5385b0b38db872a412b547ef5d8e7056865d26ae46b3b027d8b0bb37aa25ec6cb1a67abd342799795bfd3b08

    • memory/1380-33-0x0000000007110000-0x0000000007203000-memory.dmp

      Filesize

      972KB

    • memory/1380-32-0x0000000003750000-0x0000000003850000-memory.dmp

      Filesize

      1024KB

    • memory/1380-35-0x00000000091E0000-0x000000000C44E000-memory.dmp

      Filesize

      50.4MB

    • memory/1380-79-0x0000000007110000-0x0000000007203000-memory.dmp

      Filesize

      972KB

    • memory/1380-22-0x00000000091E0000-0x000000000C44E000-memory.dmp

      Filesize

      50.4MB

    • memory/1380-34-0x0000000007110000-0x0000000007203000-memory.dmp

      Filesize

      972KB

    • memory/1872-9-0x0000000000230000-0x0000000000232000-memory.dmp

      Filesize

      8KB

    • memory/2512-77-0x0000000061E00000-0x0000000061EBB000-memory.dmp

      Filesize

      748KB

    • memory/2512-25-0x0000000000090000-0x00000000000CA000-memory.dmp

      Filesize

      232KB

    • memory/2512-24-0x0000000000090000-0x00000000000CA000-memory.dmp

      Filesize

      232KB

    • memory/2512-36-0x0000000000090000-0x00000000000CA000-memory.dmp

      Filesize

      232KB

    • memory/2512-29-0x0000000001FB0000-0x00000000022B3000-memory.dmp

      Filesize

      3.0MB

    • memory/2512-30-0x0000000000090000-0x00000000000CA000-memory.dmp

      Filesize

      232KB

    • memory/2512-78-0x0000000001CF0000-0x0000000001D93000-memory.dmp

      Filesize

      652KB

    • memory/2512-31-0x0000000001CF0000-0x0000000001D93000-memory.dmp

      Filesize

      652KB

    • memory/2768-13-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/2768-28-0x0000000000290000-0x00000000002B4000-memory.dmp

      Filesize

      144KB

    • memory/2768-26-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/2768-23-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/2768-21-0x0000000000290000-0x00000000002B4000-memory.dmp

      Filesize

      144KB

    • memory/2768-20-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/2768-19-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/2768-16-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/2768-15-0x0000000000920000-0x0000000000C23000-memory.dmp

      Filesize

      3.0MB