Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/11/2023, 17:31

General

  • Target

    ae7060c5601894ec5c50d229ea5417ec.exe

  • Size

    397KB

  • MD5

    ae7060c5601894ec5c50d229ea5417ec

  • SHA1

    b338a8e8a6cedfca7ad0432d766604138d481735

  • SHA256

    40d0636d3ec2287a07009b05a8bd7d4143b6cbb35eba9c23d9cfd239c8f9c575

  • SHA512

    460944302255efc6150b7aea46748f75229ccd21cd868a4c15046c23b9c59eac0beb7d2d03353bb51e205489f6b10a435efd2ba464ec7cd61bc03aa33f072982

  • SSDEEP

    6144:XBlL/0F6wKv62AYP9ke+uyJEEp2XnnE8qP2QOyCwT3yLmMgu9cWdq1bj8HyxOf:R26y2AE9kb59qnE8YlxTogn91bj8Hpf

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 58 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3392
    • C:\Users\Admin\AppData\Local\Temp\ae7060c5601894ec5c50d229ea5417ec.exe
      "C:\Users\Admin\AppData\Local\Temp\ae7060c5601894ec5c50d229ea5417ec.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4064
      • C:\Users\Admin\AppData\Local\Temp\eonlnq.exe
        "C:\Users\Admin\AppData\Local\Temp\eonlnq.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1000
        • C:\Users\Admin\AppData\Local\Temp\eonlnq.exe
          "C:\Users\Admin\AppData\Local\Temp\eonlnq.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          PID:4816
    • C:\Windows\SysWOW64\typeperf.exe
      "C:\Windows\SysWOW64\typeperf.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:3660
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:1376

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\eonlnq.exe

            Filesize

            198KB

            MD5

            71fd33b199315633dc232fa06c7e94a8

            SHA1

            cdef7d1016f8a058430d5f778a9e4de8760acc5b

            SHA256

            e49ad42b1f8c0cdfe8843ba366ff3edbf42c3e11bfb747a847e78230dfe8e202

            SHA512

            e80e3bec218b13c975bb953e4c1e0665f33da9699e42167a7b5b9b13e3d14d64394b83da722f304b771587e515b1a9619da28d2df8e62b7ba90e64291d4ac60f

          • C:\Users\Admin\AppData\Local\Temp\eonlnq.exe

            Filesize

            198KB

            MD5

            71fd33b199315633dc232fa06c7e94a8

            SHA1

            cdef7d1016f8a058430d5f778a9e4de8760acc5b

            SHA256

            e49ad42b1f8c0cdfe8843ba366ff3edbf42c3e11bfb747a847e78230dfe8e202

            SHA512

            e80e3bec218b13c975bb953e4c1e0665f33da9699e42167a7b5b9b13e3d14d64394b83da722f304b771587e515b1a9619da28d2df8e62b7ba90e64291d4ac60f

          • C:\Users\Admin\AppData\Local\Temp\eonlnq.exe

            Filesize

            198KB

            MD5

            71fd33b199315633dc232fa06c7e94a8

            SHA1

            cdef7d1016f8a058430d5f778a9e4de8760acc5b

            SHA256

            e49ad42b1f8c0cdfe8843ba366ff3edbf42c3e11bfb747a847e78230dfe8e202

            SHA512

            e80e3bec218b13c975bb953e4c1e0665f33da9699e42167a7b5b9b13e3d14d64394b83da722f304b771587e515b1a9619da28d2df8e62b7ba90e64291d4ac60f

          • C:\Users\Admin\AppData\Local\Temp\xjsdlmxhwc.r

            Filesize

            264KB

            MD5

            5b765832505ddedac0f3c42b0dad5ec1

            SHA1

            921ff22da17ea1c6faf2a244b967091bebcda247

            SHA256

            12b51eb60f268062485c366598e05e2af9c8c5d409f11c752545d49dc64a02af

            SHA512

            5e97557abfae4d300f42048efa7c18b12e841bae164300472ce22e2d43360649f835994696b11e4988b6ff616d7d170ef3bf0c366e16fb8e8d69f9ab61e4771a

          • memory/1000-5-0x00000000004E0000-0x00000000004E2000-memory.dmp

            Filesize

            8KB

          • memory/3392-26-0x00000000033B0000-0x0000000003492000-memory.dmp

            Filesize

            904KB

          • memory/3392-37-0x00000000033B0000-0x0000000003492000-memory.dmp

            Filesize

            904KB

          • memory/3392-28-0x000000000D940000-0x000000000FC58000-memory.dmp

            Filesize

            35.1MB

          • memory/3392-27-0x00000000033B0000-0x0000000003492000-memory.dmp

            Filesize

            904KB

          • memory/3392-16-0x000000000D940000-0x000000000FC58000-memory.dmp

            Filesize

            35.1MB

          • memory/3660-36-0x0000000001190000-0x0000000001233000-memory.dmp

            Filesize

            652KB

          • memory/3660-35-0x0000000000970000-0x00000000009AA000-memory.dmp

            Filesize

            232KB

          • memory/3660-23-0x00000000013F0000-0x000000000173A000-memory.dmp

            Filesize

            3.3MB

          • memory/3660-18-0x0000000000970000-0x00000000009AA000-memory.dmp

            Filesize

            232KB

          • memory/3660-19-0x0000000000970000-0x00000000009AA000-memory.dmp

            Filesize

            232KB

          • memory/3660-25-0x0000000001190000-0x0000000001233000-memory.dmp

            Filesize

            652KB

          • memory/3660-24-0x0000000000970000-0x00000000009AA000-memory.dmp

            Filesize

            232KB

          • memory/4816-9-0x0000000000B60000-0x0000000000EAA000-memory.dmp

            Filesize

            3.3MB

          • memory/4816-22-0x0000000000A00000-0x0000000000A24000-memory.dmp

            Filesize

            144KB

          • memory/4816-20-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB

          • memory/4816-17-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB

          • memory/4816-15-0x0000000000A00000-0x0000000000A24000-memory.dmp

            Filesize

            144KB

          • memory/4816-14-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB

          • memory/4816-13-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB

          • memory/4816-10-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB

          • memory/4816-7-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB