Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
22-11-2023 17:31
Static task
static1
Behavioral task
behavioral1
Sample
ae7060c5601894ec5c50d229ea5417ec.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
ae7060c5601894ec5c50d229ea5417ec.exe
Resource
win10v2004-20231023-en
General
-
Target
ae7060c5601894ec5c50d229ea5417ec.exe
-
Size
397KB
-
MD5
ae7060c5601894ec5c50d229ea5417ec
-
SHA1
b338a8e8a6cedfca7ad0432d766604138d481735
-
SHA256
40d0636d3ec2287a07009b05a8bd7d4143b6cbb35eba9c23d9cfd239c8f9c575
-
SHA512
460944302255efc6150b7aea46748f75229ccd21cd868a4c15046c23b9c59eac0beb7d2d03353bb51e205489f6b10a435efd2ba464ec7cd61bc03aa33f072982
-
SSDEEP
6144:XBlL/0F6wKv62AYP9ke+uyJEEp2XnnE8qP2QOyCwT3yLmMgu9cWdq1bj8HyxOf:R26y2AE9kb59qnE8YlxTogn91bj8Hpf
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1872 eonlnq.exe 2768 eonlnq.exe -
Loads dropped DLL 4 IoCs
pid Process 1140 ae7060c5601894ec5c50d229ea5417ec.exe 1140 ae7060c5601894ec5c50d229ea5417ec.exe 1872 eonlnq.exe 2512 typeperf.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1872 set thread context of 2768 1872 eonlnq.exe 29 PID 2768 set thread context of 1380 2768 eonlnq.exe 14 PID 2768 set thread context of 2512 2768 eonlnq.exe 32 PID 2512 set thread context of 1380 2512 typeperf.exe 14 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \Registry\User\S-1-5-21-2085049433-1067986815-1244098655-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 typeperf.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 2768 eonlnq.exe 2768 eonlnq.exe 2768 eonlnq.exe 2768 eonlnq.exe 2768 eonlnq.exe 2768 eonlnq.exe 2768 eonlnq.exe 2768 eonlnq.exe 2512 typeperf.exe 2512 typeperf.exe 2512 typeperf.exe 2512 typeperf.exe 2512 typeperf.exe 2512 typeperf.exe 2512 typeperf.exe 2512 typeperf.exe 2512 typeperf.exe 2512 typeperf.exe 2512 typeperf.exe 2512 typeperf.exe 2512 typeperf.exe 2512 typeperf.exe 2512 typeperf.exe 2512 typeperf.exe 2512 typeperf.exe 2512 typeperf.exe 2512 typeperf.exe 2512 typeperf.exe 2512 typeperf.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1380 Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 1872 eonlnq.exe 2768 eonlnq.exe 1380 Explorer.EXE 1380 Explorer.EXE 2512 typeperf.exe 2512 typeperf.exe 2512 typeperf.exe 2512 typeperf.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1380 Explorer.EXE 1380 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1380 Explorer.EXE 1380 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1140 wrote to memory of 1872 1140 ae7060c5601894ec5c50d229ea5417ec.exe 28 PID 1140 wrote to memory of 1872 1140 ae7060c5601894ec5c50d229ea5417ec.exe 28 PID 1140 wrote to memory of 1872 1140 ae7060c5601894ec5c50d229ea5417ec.exe 28 PID 1140 wrote to memory of 1872 1140 ae7060c5601894ec5c50d229ea5417ec.exe 28 PID 1872 wrote to memory of 2768 1872 eonlnq.exe 29 PID 1872 wrote to memory of 2768 1872 eonlnq.exe 29 PID 1872 wrote to memory of 2768 1872 eonlnq.exe 29 PID 1872 wrote to memory of 2768 1872 eonlnq.exe 29 PID 1872 wrote to memory of 2768 1872 eonlnq.exe 29 PID 1380 wrote to memory of 2512 1380 Explorer.EXE 32 PID 1380 wrote to memory of 2512 1380 Explorer.EXE 32 PID 1380 wrote to memory of 2512 1380 Explorer.EXE 32 PID 1380 wrote to memory of 2512 1380 Explorer.EXE 32 PID 2512 wrote to memory of 2804 2512 typeperf.exe 35 PID 2512 wrote to memory of 2804 2512 typeperf.exe 35 PID 2512 wrote to memory of 2804 2512 typeperf.exe 35 PID 2512 wrote to memory of 2804 2512 typeperf.exe 35 PID 2512 wrote to memory of 2804 2512 typeperf.exe 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\ae7060c5601894ec5c50d229ea5417ec.exe"C:\Users\Admin\AppData\Local\Temp\ae7060c5601894ec5c50d229ea5417ec.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\eonlnq.exe"C:\Users\Admin\AppData\Local\Temp\eonlnq.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\eonlnq.exe"C:\Users\Admin\AppData\Local\Temp\eonlnq.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2768
-
-
-
-
C:\Windows\SysWOW64\typeperf.exe"C:\Windows\SysWOW64\typeperf.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:2804
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198KB
MD571fd33b199315633dc232fa06c7e94a8
SHA1cdef7d1016f8a058430d5f778a9e4de8760acc5b
SHA256e49ad42b1f8c0cdfe8843ba366ff3edbf42c3e11bfb747a847e78230dfe8e202
SHA512e80e3bec218b13c975bb953e4c1e0665f33da9699e42167a7b5b9b13e3d14d64394b83da722f304b771587e515b1a9619da28d2df8e62b7ba90e64291d4ac60f
-
Filesize
198KB
MD571fd33b199315633dc232fa06c7e94a8
SHA1cdef7d1016f8a058430d5f778a9e4de8760acc5b
SHA256e49ad42b1f8c0cdfe8843ba366ff3edbf42c3e11bfb747a847e78230dfe8e202
SHA512e80e3bec218b13c975bb953e4c1e0665f33da9699e42167a7b5b9b13e3d14d64394b83da722f304b771587e515b1a9619da28d2df8e62b7ba90e64291d4ac60f
-
Filesize
198KB
MD571fd33b199315633dc232fa06c7e94a8
SHA1cdef7d1016f8a058430d5f778a9e4de8760acc5b
SHA256e49ad42b1f8c0cdfe8843ba366ff3edbf42c3e11bfb747a847e78230dfe8e202
SHA512e80e3bec218b13c975bb953e4c1e0665f33da9699e42167a7b5b9b13e3d14d64394b83da722f304b771587e515b1a9619da28d2df8e62b7ba90e64291d4ac60f
-
Filesize
198KB
MD571fd33b199315633dc232fa06c7e94a8
SHA1cdef7d1016f8a058430d5f778a9e4de8760acc5b
SHA256e49ad42b1f8c0cdfe8843ba366ff3edbf42c3e11bfb747a847e78230dfe8e202
SHA512e80e3bec218b13c975bb953e4c1e0665f33da9699e42167a7b5b9b13e3d14d64394b83da722f304b771587e515b1a9619da28d2df8e62b7ba90e64291d4ac60f
-
Filesize
430KB
MD530a561abb006b9d5debdd51dab743700
SHA1e19c8d436f5b6ed66db21e32020f5ab6406241ca
SHA25662da7ad6252a7778f096d62d9485a97ac48f2f2d0258cecd471aaada98877fe2
SHA512e48b51bb99083c7e9fd55e28c9c667bf9c6c7141c1b620ce71542849bfed53a92585897321831743e80a8eea3ac0c787ab091f742bf58b587a5e50f723443c53
-
Filesize
264KB
MD55b765832505ddedac0f3c42b0dad5ec1
SHA1921ff22da17ea1c6faf2a244b967091bebcda247
SHA25612b51eb60f268062485c366598e05e2af9c8c5d409f11c752545d49dc64a02af
SHA5125e97557abfae4d300f42048efa7c18b12e841bae164300472ce22e2d43360649f835994696b11e4988b6ff616d7d170ef3bf0c366e16fb8e8d69f9ab61e4771a
-
Filesize
198KB
MD571fd33b199315633dc232fa06c7e94a8
SHA1cdef7d1016f8a058430d5f778a9e4de8760acc5b
SHA256e49ad42b1f8c0cdfe8843ba366ff3edbf42c3e11bfb747a847e78230dfe8e202
SHA512e80e3bec218b13c975bb953e4c1e0665f33da9699e42167a7b5b9b13e3d14d64394b83da722f304b771587e515b1a9619da28d2df8e62b7ba90e64291d4ac60f
-
Filesize
198KB
MD571fd33b199315633dc232fa06c7e94a8
SHA1cdef7d1016f8a058430d5f778a9e4de8760acc5b
SHA256e49ad42b1f8c0cdfe8843ba366ff3edbf42c3e11bfb747a847e78230dfe8e202
SHA512e80e3bec218b13c975bb953e4c1e0665f33da9699e42167a7b5b9b13e3d14d64394b83da722f304b771587e515b1a9619da28d2df8e62b7ba90e64291d4ac60f
-
Filesize
198KB
MD571fd33b199315633dc232fa06c7e94a8
SHA1cdef7d1016f8a058430d5f778a9e4de8760acc5b
SHA256e49ad42b1f8c0cdfe8843ba366ff3edbf42c3e11bfb747a847e78230dfe8e202
SHA512e80e3bec218b13c975bb953e4c1e0665f33da9699e42167a7b5b9b13e3d14d64394b83da722f304b771587e515b1a9619da28d2df8e62b7ba90e64291d4ac60f
-
Filesize
820KB
MD5317ba2f8e624ec0c7d3714e2bde4f346
SHA112734675cfad66d78252515644a624964f69f94d
SHA2560c2093493424e885c297d613e0cf343d8a084253ca3b044415e14c6e94696877
SHA512ecc4a6f951cd7958288b7de35b253475fcc0910f5385b0b38db872a412b547ef5d8e7056865d26ae46b3b027d8b0bb37aa25ec6cb1a67abd342799795bfd3b08