Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 00:13

General

  • Target

    0827d65d751f87c4af0374c17ff35c11.exe

  • Size

    332KB

  • MD5

    0827d65d751f87c4af0374c17ff35c11

  • SHA1

    62e3f62911e9d57c10201747e5036f2f530f5961

  • SHA256

    349d0c0a281e1fd08fefb9a3e4d34a716aecbc4e06b90e37e30987accc5bbfae

  • SHA512

    0adedea88213ca98658733e0973c939c3a573ed7d1c0b7138102e521e525131762ce4749d5a6671d035da2bceaf13c6dd9c6f8b20b475f565caab641bf38e77e

  • SSDEEP

    6144:PV6x7vEcS+t/0/Xo3/DwcmtQJpJaaP8fIFB1gJuq41XAkvvFvL4qGoAYmLM8/BhD:PE7XVYi/DvTEf6GJuqsXAkvvFvL4qGoI

Malware Config

Signatures

  • Disables taskbar notifications via registry modification
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Modifies system executable filetype association 2 TTPs 17 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies registry class 41 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 20 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0827d65d751f87c4af0374c17ff35c11.exe
    "C:\Users\Admin\AppData\Local\Temp\0827d65d751f87c4af0374c17ff35c11.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2400
    • C:\Users\Admin\AppData\Local\evg.exe
      "C:\Users\Admin\AppData\Local\evg.exe" -gav C:\Users\Admin\AppData\Local\Temp\0827d65d751f87c4af0374c17ff35c11.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2460
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Modifies Installed Components in the registry
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\evg.exe

    Filesize

    332KB

    MD5

    0827d65d751f87c4af0374c17ff35c11

    SHA1

    62e3f62911e9d57c10201747e5036f2f530f5961

    SHA256

    349d0c0a281e1fd08fefb9a3e4d34a716aecbc4e06b90e37e30987accc5bbfae

    SHA512

    0adedea88213ca98658733e0973c939c3a573ed7d1c0b7138102e521e525131762ce4749d5a6671d035da2bceaf13c6dd9c6f8b20b475f565caab641bf38e77e

  • memory/2400-0-0x0000000000230000-0x000000000023C000-memory.dmp

    Filesize

    48KB

  • memory/2400-1-0x0000000000400000-0x00000000005F5000-memory.dmp

    Filesize

    2.0MB

  • memory/2400-3-0x0000000001FD0000-0x0000000002287000-memory.dmp

    Filesize

    2.7MB

  • memory/2400-2-0x0000000000400000-0x00000000005F5000-memory.dmp

    Filesize

    2.0MB

  • memory/2400-9-0x0000000000400000-0x00000000005F5000-memory.dmp

    Filesize

    2.0MB

  • memory/2460-23-0x0000000000400000-0x00000000005F5000-memory.dmp

    Filesize

    2.0MB

  • memory/2460-11-0x0000000000400000-0x00000000005F5000-memory.dmp

    Filesize

    2.0MB

  • memory/2460-13-0x0000000000400000-0x00000000005F5000-memory.dmp

    Filesize

    2.0MB

  • memory/2460-14-0x0000000000400000-0x00000000005F5000-memory.dmp

    Filesize

    2.0MB

  • memory/2460-30-0x0000000000400000-0x00000000005F5000-memory.dmp

    Filesize

    2.0MB

  • memory/2460-16-0x0000000000400000-0x00000000005F5000-memory.dmp

    Filesize

    2.0MB

  • memory/2460-17-0x0000000000400000-0x00000000005F5000-memory.dmp

    Filesize

    2.0MB

  • memory/2460-18-0x0000000000400000-0x00000000005F5000-memory.dmp

    Filesize

    2.0MB

  • memory/2460-22-0x0000000000400000-0x00000000005F5000-memory.dmp

    Filesize

    2.0MB

  • memory/2460-28-0x0000000000400000-0x00000000005F5000-memory.dmp

    Filesize

    2.0MB

  • memory/2460-24-0x0000000000400000-0x00000000005F5000-memory.dmp

    Filesize

    2.0MB

  • memory/2460-25-0x0000000000400000-0x00000000005F5000-memory.dmp

    Filesize

    2.0MB

  • memory/2460-26-0x0000000000400000-0x00000000005F5000-memory.dmp

    Filesize

    2.0MB

  • memory/2460-27-0x0000000000400000-0x00000000005F5000-memory.dmp

    Filesize

    2.0MB

  • memory/2840-12-0x00000000041D0000-0x00000000041D1000-memory.dmp

    Filesize

    4KB

  • memory/2840-29-0x00000000025C0000-0x00000000025D0000-memory.dmp

    Filesize

    64KB

  • memory/2840-15-0x00000000041D0000-0x00000000041D1000-memory.dmp

    Filesize

    4KB