Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 04:36
Static task
static1
Behavioral task
behavioral1
Sample
0eade894df6a630fac0070b78c735fe0.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0eade894df6a630fac0070b78c735fe0.exe
Resource
win10v2004-20231222-en
General
-
Target
0eade894df6a630fac0070b78c735fe0.exe
-
Size
6.8MB
-
MD5
0eade894df6a630fac0070b78c735fe0
-
SHA1
c19f10a17d715c67fc47090f66956e9cb8f3d625
-
SHA256
f57f8479bbd909018d0d9d6905daca0e2002a49a2ba9d930c3cd105a6b7ca302
-
SHA512
9d0f6e79e93e3b50b2a793061b29fb7a8153586e9fd88fcb93703a464504af4f0d3d3063a5d30b7dcfb1b282a759b1b603b91709fa2639efb04f44861fd215f4
-
SSDEEP
196608:JGEGnqSnezwC5jtzcVklC0eOJYkuse4BUfS:fIWj5jtzcklLeOwseH6
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1248 0eade894df6a630fac0070b78c735fe0.tmp 2596 wmfdist.exe 2696 CardRecoveryEFO.exe -
Loads dropped DLL 4 IoCs
pid Process 2952 0eade894df6a630fac0070b78c735fe0.exe 1248 0eade894df6a630fac0070b78c735fe0.tmp 1248 0eade894df6a630fac0070b78c735fe0.tmp 1248 0eade894df6a630fac0070b78c735fe0.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 9 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\EFO Recovery\wmfdist.exe 0eade894df6a630fac0070b78c735fe0.tmp File created C:\Program Files (x86)\EFO Recovery\is-5AT91.tmp 0eade894df6a630fac0070b78c735fe0.tmp File created C:\Program Files (x86)\EFO Recovery\is-VUBQF.tmp 0eade894df6a630fac0070b78c735fe0.tmp File created C:\Program Files (x86)\EFO Recovery\is-559F2.tmp 0eade894df6a630fac0070b78c735fe0.tmp File opened for modification C:\Program Files (x86)\EFO Recovery\unins000.dat 0eade894df6a630fac0070b78c735fe0.tmp File opened for modification C:\Program Files (x86)\EFO Recovery\CardRecoveryEFO.exe 0eade894df6a630fac0070b78c735fe0.tmp File opened for modification C:\Program Files (x86)\EFO Recovery\sqlite3.dll 0eade894df6a630fac0070b78c735fe0.tmp File created C:\Program Files (x86)\EFO Recovery\unins000.dat 0eade894df6a630fac0070b78c735fe0.tmp File created C:\Program Files (x86)\EFO Recovery\is-05QGQ.tmp 0eade894df6a630fac0070b78c735fe0.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1248 0eade894df6a630fac0070b78c735fe0.tmp 1248 0eade894df6a630fac0070b78c735fe0.tmp 2696 CardRecoveryEFO.exe 2696 CardRecoveryEFO.exe 2696 CardRecoveryEFO.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1248 0eade894df6a630fac0070b78c735fe0.tmp -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2952 wrote to memory of 1248 2952 0eade894df6a630fac0070b78c735fe0.exe 18 PID 2952 wrote to memory of 1248 2952 0eade894df6a630fac0070b78c735fe0.exe 18 PID 2952 wrote to memory of 1248 2952 0eade894df6a630fac0070b78c735fe0.exe 18 PID 2952 wrote to memory of 1248 2952 0eade894df6a630fac0070b78c735fe0.exe 18 PID 2952 wrote to memory of 1248 2952 0eade894df6a630fac0070b78c735fe0.exe 18 PID 2952 wrote to memory of 1248 2952 0eade894df6a630fac0070b78c735fe0.exe 18 PID 2952 wrote to memory of 1248 2952 0eade894df6a630fac0070b78c735fe0.exe 18 PID 1248 wrote to memory of 2596 1248 0eade894df6a630fac0070b78c735fe0.tmp 23 PID 1248 wrote to memory of 2596 1248 0eade894df6a630fac0070b78c735fe0.tmp 23 PID 1248 wrote to memory of 2596 1248 0eade894df6a630fac0070b78c735fe0.tmp 23 PID 1248 wrote to memory of 2596 1248 0eade894df6a630fac0070b78c735fe0.tmp 23 PID 1248 wrote to memory of 2596 1248 0eade894df6a630fac0070b78c735fe0.tmp 23 PID 1248 wrote to memory of 2596 1248 0eade894df6a630fac0070b78c735fe0.tmp 23 PID 1248 wrote to memory of 2596 1248 0eade894df6a630fac0070b78c735fe0.tmp 23 PID 1248 wrote to memory of 2696 1248 0eade894df6a630fac0070b78c735fe0.tmp 22 PID 1248 wrote to memory of 2696 1248 0eade894df6a630fac0070b78c735fe0.tmp 22 PID 1248 wrote to memory of 2696 1248 0eade894df6a630fac0070b78c735fe0.tmp 22 PID 1248 wrote to memory of 2696 1248 0eade894df6a630fac0070b78c735fe0.tmp 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\0eade894df6a630fac0070b78c735fe0.exe"C:\Users\Admin\AppData\Local\Temp\0eade894df6a630fac0070b78c735fe0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\is-7UUQG.tmp\0eade894df6a630fac0070b78c735fe0.tmp"C:\Users\Admin\AppData\Local\Temp\is-7UUQG.tmp\0eade894df6a630fac0070b78c735fe0.tmp" /SL5="$70120,6390235,721408,C:\Users\Admin\AppData\Local\Temp\0eade894df6a630fac0070b78c735fe0.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Program Files (x86)\EFO Recovery\CardRecoveryEFO.exe"C:\Program Files (x86)\EFO Recovery\CardRecoveryEFO.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2696
-
-
C:\Program Files (x86)\EFO Recovery\wmfdist.exe"C:\Program Files (x86)\EFO Recovery\wmfdist.exe" /Q:A /R:N3⤵
- Executes dropped EXE
PID:2596
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
894KB
MD562caef482aac63af2437d8dbfcf7e336
SHA1bdbc2ff16acfa5143736e7cb902dabdd6c8b0cad
SHA256d235a14956188ab24d4adc56deeb23887c777fa32448eaf2a9b48f4d91cab68d
SHA512b51352f339b6f118aa33fc972c9f585f1d7f4667423aaeee7e8b352cfb3af53da8b493791bd45409681c17e55db5387e647867123b69272771aa4eb480a9d314
-
Filesize
92KB
MD5e3bd2dd07d94b742b5e3bddfd1304a84
SHA1aaff04a80b171e38918dc8dad54ab5a27d95cc13
SHA256dbfae24ff1a0b94676529839461ccda94b6d810124c48b1d849c832ab457e1c8
SHA51275ab4b8889e8d3fee472a323e833c13ca8b63cf42dc1d9a83a6543fbb1d8ce7f5380806b6d854c7fc8a54f4bcff42b78853300eaf1ed8d68576f155761ba3dbd
-
Filesize
856KB
MD5a02675c8c7b0be8ab9a5ac59b95c2616
SHA1c37541f83f94b2443facfe8a7d68089a60677bbe
SHA256fecdfda2818787a5c062cf61c206244ec58eafda55f0ed4f38279ebed5f71f13
SHA5120662ca0b7ac858642b16d3c6b73e2bddc92c82a7b42c60f14bb1e6e1150a94e5ffb588d064d69120636a8c1d982f36be421f7201c55a59245cdc1c54874d2d3c