Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2023, 17:31
Static task
static1
Behavioral task
behavioral1
Sample
ae7060c5601894ec5c50d229ea5417ec.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
ae7060c5601894ec5c50d229ea5417ec.exe
Resource
win10v2004-20231023-en
General
-
Target
ae7060c5601894ec5c50d229ea5417ec.exe
-
Size
397KB
-
MD5
ae7060c5601894ec5c50d229ea5417ec
-
SHA1
b338a8e8a6cedfca7ad0432d766604138d481735
-
SHA256
40d0636d3ec2287a07009b05a8bd7d4143b6cbb35eba9c23d9cfd239c8f9c575
-
SHA512
460944302255efc6150b7aea46748f75229ccd21cd868a4c15046c23b9c59eac0beb7d2d03353bb51e205489f6b10a435efd2ba464ec7cd61bc03aa33f072982
-
SSDEEP
6144:XBlL/0F6wKv62AYP9ke+uyJEEp2XnnE8qP2QOyCwT3yLmMgu9cWdq1bj8HyxOf:R26y2AE9kb59qnE8YlxTogn91bj8Hpf
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1000 eonlnq.exe 4816 eonlnq.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1000 set thread context of 4816 1000 eonlnq.exe 86 PID 4816 set thread context of 3392 4816 eonlnq.exe 69 PID 4816 set thread context of 3660 4816 eonlnq.exe 101 PID 3660 set thread context of 3392 3660 typeperf.exe 69 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \Registry\User\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 typeperf.exe -
Suspicious behavior: EnumeratesProcesses 58 IoCs
pid Process 4816 eonlnq.exe 4816 eonlnq.exe 4816 eonlnq.exe 4816 eonlnq.exe 4816 eonlnq.exe 4816 eonlnq.exe 4816 eonlnq.exe 4816 eonlnq.exe 4816 eonlnq.exe 4816 eonlnq.exe 4816 eonlnq.exe 4816 eonlnq.exe 4816 eonlnq.exe 4816 eonlnq.exe 4816 eonlnq.exe 4816 eonlnq.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3392 Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 1000 eonlnq.exe 4816 eonlnq.exe 3392 Explorer.EXE 3392 Explorer.EXE 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe 3660 typeperf.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3392 Explorer.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4064 wrote to memory of 1000 4064 ae7060c5601894ec5c50d229ea5417ec.exe 84 PID 4064 wrote to memory of 1000 4064 ae7060c5601894ec5c50d229ea5417ec.exe 84 PID 4064 wrote to memory of 1000 4064 ae7060c5601894ec5c50d229ea5417ec.exe 84 PID 1000 wrote to memory of 4816 1000 eonlnq.exe 86 PID 1000 wrote to memory of 4816 1000 eonlnq.exe 86 PID 1000 wrote to memory of 4816 1000 eonlnq.exe 86 PID 1000 wrote to memory of 4816 1000 eonlnq.exe 86 PID 3392 wrote to memory of 3660 3392 Explorer.EXE 101 PID 3392 wrote to memory of 3660 3392 Explorer.EXE 101 PID 3392 wrote to memory of 3660 3392 Explorer.EXE 101 PID 3660 wrote to memory of 1376 3660 typeperf.exe 104 PID 3660 wrote to memory of 1376 3660 typeperf.exe 104 PID 3660 wrote to memory of 1376 3660 typeperf.exe 104
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\ae7060c5601894ec5c50d229ea5417ec.exe"C:\Users\Admin\AppData\Local\Temp\ae7060c5601894ec5c50d229ea5417ec.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\eonlnq.exe"C:\Users\Admin\AppData\Local\Temp\eonlnq.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\eonlnq.exe"C:\Users\Admin\AppData\Local\Temp\eonlnq.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4816
-
-
-
-
C:\Windows\SysWOW64\typeperf.exe"C:\Windows\SysWOW64\typeperf.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1376
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198KB
MD571fd33b199315633dc232fa06c7e94a8
SHA1cdef7d1016f8a058430d5f778a9e4de8760acc5b
SHA256e49ad42b1f8c0cdfe8843ba366ff3edbf42c3e11bfb747a847e78230dfe8e202
SHA512e80e3bec218b13c975bb953e4c1e0665f33da9699e42167a7b5b9b13e3d14d64394b83da722f304b771587e515b1a9619da28d2df8e62b7ba90e64291d4ac60f
-
Filesize
198KB
MD571fd33b199315633dc232fa06c7e94a8
SHA1cdef7d1016f8a058430d5f778a9e4de8760acc5b
SHA256e49ad42b1f8c0cdfe8843ba366ff3edbf42c3e11bfb747a847e78230dfe8e202
SHA512e80e3bec218b13c975bb953e4c1e0665f33da9699e42167a7b5b9b13e3d14d64394b83da722f304b771587e515b1a9619da28d2df8e62b7ba90e64291d4ac60f
-
Filesize
198KB
MD571fd33b199315633dc232fa06c7e94a8
SHA1cdef7d1016f8a058430d5f778a9e4de8760acc5b
SHA256e49ad42b1f8c0cdfe8843ba366ff3edbf42c3e11bfb747a847e78230dfe8e202
SHA512e80e3bec218b13c975bb953e4c1e0665f33da9699e42167a7b5b9b13e3d14d64394b83da722f304b771587e515b1a9619da28d2df8e62b7ba90e64291d4ac60f
-
Filesize
264KB
MD55b765832505ddedac0f3c42b0dad5ec1
SHA1921ff22da17ea1c6faf2a244b967091bebcda247
SHA25612b51eb60f268062485c366598e05e2af9c8c5d409f11c752545d49dc64a02af
SHA5125e97557abfae4d300f42048efa7c18b12e841bae164300472ce22e2d43360649f835994696b11e4988b6ff616d7d170ef3bf0c366e16fb8e8d69f9ab61e4771a