Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 10:06
Static task
static1
Behavioral task
behavioral1
Sample
15581a1a7ea5556e2bf99d900da6f956.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
15581a1a7ea5556e2bf99d900da6f956.exe
Resource
win10v2004-20231215-en
General
-
Target
15581a1a7ea5556e2bf99d900da6f956.exe
-
Size
93KB
-
MD5
15581a1a7ea5556e2bf99d900da6f956
-
SHA1
eb6fa66083c4091bf07450b74cd836857edc5c42
-
SHA256
26900865ce49ed9f34a58f05cda73d430b1b9ffcebeb62f890babb34aec9282b
-
SHA512
37cc097f3761fa5b429b722da96d77cd439f1222e4289e7774908703734a16cc4687fbcd65c2d5c0bcdd2ea16728b14cdda0b0107f4b414f132a3718fab48538
-
SSDEEP
1536:vwH8Alr3QF/GTqg8HLhobQLAfm5b8HLljs2mwEhstzWrY8p:6rlr39Og8HlKQLAfMmLljJmwEixWrhp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2528 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2200 espo.exe -
Loads dropped DLL 2 IoCs
pid Process 1860 15581a1a7ea5556e2bf99d900da6f956.exe 1860 15581a1a7ea5556e2bf99d900da6f956.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\{520C887D-2F8E-A7EE-FA7E-52AE36001158} = "C:\\Users\\Admin\\AppData\\Roaming\\Aqugir\\espo.exe" espo.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1860 set thread context of 2528 1860 15581a1a7ea5556e2bf99d900da6f956.exe 2 -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 15581a1a7ea5556e2bf99d900da6f956.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Privacy 15581a1a7ea5556e2bf99d900da6f956.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2200 espo.exe 2200 espo.exe 2200 espo.exe 2200 espo.exe 2200 espo.exe 2200 espo.exe 2200 espo.exe 2200 espo.exe 2200 espo.exe 2200 espo.exe 2200 espo.exe 2200 espo.exe 2200 espo.exe 2200 espo.exe 2200 espo.exe 2200 espo.exe 2200 espo.exe 2200 espo.exe 2200 espo.exe 2200 espo.exe 2200 espo.exe 2200 espo.exe 2200 espo.exe 2200 espo.exe 2200 espo.exe 2200 espo.exe 2200 espo.exe 2200 espo.exe 2200 espo.exe 2200 espo.exe 2200 espo.exe 2200 espo.exe 2200 espo.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 1860 15581a1a7ea5556e2bf99d900da6f956.exe Token: SeSecurityPrivilege 1860 15581a1a7ea5556e2bf99d900da6f956.exe Token: SeSecurityPrivilege 1860 15581a1a7ea5556e2bf99d900da6f956.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1860 wrote to memory of 2200 1860 15581a1a7ea5556e2bf99d900da6f956.exe 3 PID 1860 wrote to memory of 2200 1860 15581a1a7ea5556e2bf99d900da6f956.exe 3 PID 1860 wrote to memory of 2200 1860 15581a1a7ea5556e2bf99d900da6f956.exe 3 PID 1860 wrote to memory of 2200 1860 15581a1a7ea5556e2bf99d900da6f956.exe 3 PID 2200 wrote to memory of 1208 2200 espo.exe 12 PID 2200 wrote to memory of 1208 2200 espo.exe 12 PID 2200 wrote to memory of 1208 2200 espo.exe 12 PID 2200 wrote to memory of 1208 2200 espo.exe 12 PID 2200 wrote to memory of 1208 2200 espo.exe 12 PID 2200 wrote to memory of 1320 2200 espo.exe 11 PID 2200 wrote to memory of 1320 2200 espo.exe 11 PID 2200 wrote to memory of 1320 2200 espo.exe 11 PID 2200 wrote to memory of 1320 2200 espo.exe 11 PID 2200 wrote to memory of 1320 2200 espo.exe 11 PID 2200 wrote to memory of 1384 2200 espo.exe 10 PID 2200 wrote to memory of 1384 2200 espo.exe 10 PID 2200 wrote to memory of 1384 2200 espo.exe 10 PID 2200 wrote to memory of 1384 2200 espo.exe 10 PID 2200 wrote to memory of 1384 2200 espo.exe 10 PID 2200 wrote to memory of 1604 2200 espo.exe 8 PID 2200 wrote to memory of 1604 2200 espo.exe 8 PID 2200 wrote to memory of 1604 2200 espo.exe 8 PID 2200 wrote to memory of 1604 2200 espo.exe 8 PID 2200 wrote to memory of 1604 2200 espo.exe 8 PID 2200 wrote to memory of 1860 2200 espo.exe 4 PID 2200 wrote to memory of 1860 2200 espo.exe 4 PID 2200 wrote to memory of 1860 2200 espo.exe 4 PID 2200 wrote to memory of 1860 2200 espo.exe 4 PID 2200 wrote to memory of 1860 2200 espo.exe 4 PID 1860 wrote to memory of 2528 1860 15581a1a7ea5556e2bf99d900da6f956.exe 2 PID 1860 wrote to memory of 2528 1860 15581a1a7ea5556e2bf99d900da6f956.exe 2 PID 1860 wrote to memory of 2528 1860 15581a1a7ea5556e2bf99d900da6f956.exe 2 PID 1860 wrote to memory of 2528 1860 15581a1a7ea5556e2bf99d900da6f956.exe 2 PID 1860 wrote to memory of 2528 1860 15581a1a7ea5556e2bf99d900da6f956.exe 2 PID 1860 wrote to memory of 2528 1860 15581a1a7ea5556e2bf99d900da6f956.exe 2 PID 1860 wrote to memory of 2528 1860 15581a1a7ea5556e2bf99d900da6f956.exe 2 PID 1860 wrote to memory of 2528 1860 15581a1a7ea5556e2bf99d900da6f956.exe 2 PID 1860 wrote to memory of 2528 1860 15581a1a7ea5556e2bf99d900da6f956.exe 2 PID 2200 wrote to memory of 2884 2200 espo.exe 31 PID 2200 wrote to memory of 2884 2200 espo.exe 31 PID 2200 wrote to memory of 2884 2200 espo.exe 31 PID 2200 wrote to memory of 2884 2200 espo.exe 31 PID 2200 wrote to memory of 2884 2200 espo.exe 31 PID 2200 wrote to memory of 1532 2200 espo.exe 34 PID 2200 wrote to memory of 1532 2200 espo.exe 34 PID 2200 wrote to memory of 1532 2200 espo.exe 34 PID 2200 wrote to memory of 1532 2200 espo.exe 34 PID 2200 wrote to memory of 1532 2200 espo.exe 34
Processes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp9518e9c9.bat"1⤵
- Deletes itself
PID:2528
-
C:\Users\Admin\AppData\Roaming\Aqugir\espo.exe"C:\Users\Admin\AppData\Roaming\Aqugir\espo.exe"1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2200
-
C:\Users\Admin\AppData\Local\Temp\15581a1a7ea5556e2bf99d900da6f956.exe"C:\Users\Admin\AppData\Local\Temp\15581a1a7ea5556e2bf99d900da6f956.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1860
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1604
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1384
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1320
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1208
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2884
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
243B
MD5211ff5f6b2278ebfe3443b091696450d
SHA1ec856268d513e76021561a482b332fe57f6759f1
SHA256a96681cb807bd6d7495dcb053ad7485de1ea4464ba909910c3c0b222c88dc688
SHA512dd365d0826b4afc5c14cae7bcb1b08b9fd0da3a650618bce0296393dc0dcd221da9c15041f16358b0425e5e68d3831fa62de385431bbeffaa67e14ab126d264d
-
Filesize
93KB
MD5a584d74e2d6362b9777cd992f4a52f22
SHA19182db61060f344ede45b0dfce3a85f4176aa3f1
SHA2565817cc168e9c476a499686c39815dac65f80f834334fe3ac0ff89f22a2c47ebc
SHA5123e1e5fe23f329400953c366d660a639baabac099eaefea05c683d4ae0e62b2b5d6c89005f2c299d338474dad04a24fb1e21f5a3e109eaeac2006a42729ecb3d0
-
Filesize
366B
MD53235125a8c86c603db709fbacf7be713
SHA1ad1bcf5b76d59774ca304049a50010e4dc4f03b7
SHA256e98c4dc0a73fec281e0fe95de4226d6dd30ced6e925972a56f9d8395d8f22869
SHA512559bf6f1e2189c6a043ec0fb44e9c42b4bf6c9d5a22780d637280b91432189c442e7e0793fb93a87e5ff20ed2603b62af49b88bda7f5a7f35c9594122f6d6110