Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
02-02-2024 05:41
Behavioral task
behavioral1
Sample
88b328a1ccd518514da2fe88c61bfee2.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
88b328a1ccd518514da2fe88c61bfee2.exe
Resource
win10v2004-20231215-en
General
-
Target
88b328a1ccd518514da2fe88c61bfee2.exe
-
Size
364KB
-
MD5
88b328a1ccd518514da2fe88c61bfee2
-
SHA1
594b94463da34d5b23068a0c37197989728a243a
-
SHA256
0fd0899e365646ef59c5971addf8666f066015bfe400d7977291ebb145f9937e
-
SHA512
cc16ea812fa3deac3418e1c48a6eef398f609958178ccc85152a91f90d48796f9aef0c7c32a6350fab96fee742f97d47dc29347296fd126d921ed8bb16ba1d08
-
SSDEEP
6144:Xn8ukcbLviSGqJjW8lE0crUTMX+82IXpW0vH66RVas3Gmxq2/2eW/ZDUp/fIIbGi:Xn8HcbL6Sdvu0YUTk1ZW0vH66vW92/Cu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 804 ekzo.exe -
Loads dropped DLL 2 IoCs
pid Process 2356 88b328a1ccd518514da2fe88c61bfee2.exe 2356 88b328a1ccd518514da2fe88c61bfee2.exe -
resource yara_rule behavioral1/files/0x000d0000000141c0-14.dat upx behavioral1/files/0x000d0000000141c0-12.dat upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\{F08D48C8-DA76-AD4E-F540-ECC2E1DBCFDF} = "C:\\Users\\Admin\\AppData\\Roaming\\Acvoe\\ekzo.exe" ekzo.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2356 set thread context of 1864 2356 88b328a1ccd518514da2fe88c61bfee2.exe 16 -
Program crash 1 IoCs
pid pid_target Process 1512 1864 WerFault.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Privacy 88b328a1ccd518514da2fe88c61bfee2.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 88b328a1ccd518514da2fe88c61bfee2.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 2356 88b328a1ccd518514da2fe88c61bfee2.exe Token: SeSecurityPrivilege 2356 88b328a1ccd518514da2fe88c61bfee2.exe Token: SeSecurityPrivilege 2356 88b328a1ccd518514da2fe88c61bfee2.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2356 wrote to memory of 804 2356 88b328a1ccd518514da2fe88c61bfee2.exe 17 PID 2356 wrote to memory of 804 2356 88b328a1ccd518514da2fe88c61bfee2.exe 17 PID 2356 wrote to memory of 804 2356 88b328a1ccd518514da2fe88c61bfee2.exe 17 PID 2356 wrote to memory of 804 2356 88b328a1ccd518514da2fe88c61bfee2.exe 17 PID 804 wrote to memory of 1272 804 ekzo.exe 9 PID 804 wrote to memory of 1272 804 ekzo.exe 9 PID 804 wrote to memory of 1272 804 ekzo.exe 9 PID 804 wrote to memory of 1272 804 ekzo.exe 9 PID 804 wrote to memory of 1272 804 ekzo.exe 9 PID 804 wrote to memory of 1340 804 ekzo.exe 8 PID 804 wrote to memory of 1340 804 ekzo.exe 8 PID 804 wrote to memory of 1340 804 ekzo.exe 8 PID 804 wrote to memory of 1340 804 ekzo.exe 8 PID 804 wrote to memory of 1340 804 ekzo.exe 8 PID 804 wrote to memory of 1372 804 ekzo.exe 7 PID 804 wrote to memory of 1372 804 ekzo.exe 7 PID 804 wrote to memory of 1372 804 ekzo.exe 7 PID 804 wrote to memory of 1372 804 ekzo.exe 7 PID 804 wrote to memory of 1372 804 ekzo.exe 7 PID 804 wrote to memory of 1968 804 ekzo.exe 5 PID 804 wrote to memory of 1968 804 ekzo.exe 5 PID 804 wrote to memory of 1968 804 ekzo.exe 5 PID 804 wrote to memory of 1968 804 ekzo.exe 5 PID 804 wrote to memory of 1968 804 ekzo.exe 5 PID 804 wrote to memory of 2356 804 ekzo.exe 1 PID 804 wrote to memory of 2356 804 ekzo.exe 1 PID 804 wrote to memory of 2356 804 ekzo.exe 1 PID 804 wrote to memory of 2356 804 ekzo.exe 1 PID 804 wrote to memory of 2356 804 ekzo.exe 1 PID 2356 wrote to memory of 1864 2356 88b328a1ccd518514da2fe88c61bfee2.exe 16 PID 2356 wrote to memory of 1864 2356 88b328a1ccd518514da2fe88c61bfee2.exe 16 PID 2356 wrote to memory of 1864 2356 88b328a1ccd518514da2fe88c61bfee2.exe 16 PID 2356 wrote to memory of 1864 2356 88b328a1ccd518514da2fe88c61bfee2.exe 16 PID 2356 wrote to memory of 1864 2356 88b328a1ccd518514da2fe88c61bfee2.exe 16 PID 2356 wrote to memory of 1864 2356 88b328a1ccd518514da2fe88c61bfee2.exe 16 PID 2356 wrote to memory of 1864 2356 88b328a1ccd518514da2fe88c61bfee2.exe 16 PID 2356 wrote to memory of 1864 2356 88b328a1ccd518514da2fe88c61bfee2.exe 16 PID 2356 wrote to memory of 1864 2356 88b328a1ccd518514da2fe88c61bfee2.exe 16 PID 1864 wrote to memory of 1512 1864 cmd.exe 14 PID 1864 wrote to memory of 1512 1864 cmd.exe 14 PID 1864 wrote to memory of 1512 1864 cmd.exe 14 PID 1864 wrote to memory of 1512 1864 cmd.exe 14 PID 804 wrote to memory of 380 804 ekzo.exe 15 PID 804 wrote to memory of 380 804 ekzo.exe 15 PID 804 wrote to memory of 380 804 ekzo.exe 15 PID 804 wrote to memory of 380 804 ekzo.exe 15 PID 804 wrote to memory of 380 804 ekzo.exe 15 PID 804 wrote to memory of 1512 804 ekzo.exe 14 PID 804 wrote to memory of 1512 804 ekzo.exe 14 PID 804 wrote to memory of 1512 804 ekzo.exe 14 PID 804 wrote to memory of 1512 804 ekzo.exe 14 PID 804 wrote to memory of 1512 804 ekzo.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\88b328a1ccd518514da2fe88c61bfee2.exe"C:\Users\Admin\AppData\Local\Temp\88b328a1ccd518514da2fe88c61bfee2.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpe020d382.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1864
-
-
C:\Users\Admin\AppData\Roaming\Acvoe\ekzo.exe"C:\Users\Admin\AppData\Roaming\Acvoe\ekzo.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:804
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1968
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1372
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1340
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1864 -s 1121⤵
- Program crash
PID:1512
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-72238316479261442616869617291388848372449990717-1742936445221381447807014376"1⤵PID:380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
364KB
MD589e38462934f3e4b2851e4d10496cc68
SHA1a150f1a93883abcf3bd9fcfaccc1754e0bbd98dc
SHA256d92423038001bc74a848c4defe11f9ca99f51836e9a9717e6b99c39e894d1c8b
SHA51265c7ec5a6fafe98b76c8139419967b63404f752b6cc4eadc9c99429405bf243267366aaae8f0df0375d555e5ebd2995e4053723056313fdc9d7cedde0788bab1
-
Filesize
225KB
MD585f943eaa44212d0e4d837dfdea8003a
SHA11616b815eddb4e513d2e789b51bb63deb0c9776a
SHA25687748b42432690060e34ffa5db97f01cba312ead1fe240afcbc412ab9f2812c7
SHA512e1158c09e43e870d2d5061702e39d15826295cdb4e366f08881f820cc3ddc71d3b03f8441a1e6a6c7fd557054fc16dd54deecdf1d72dc46a455d9035cc262006
-
Filesize
366B
MD5d6936e39b89db0671880e5976968a1d6
SHA16b1147c9d57898b0da79b6b1c9d8c0a960766388
SHA256262e6ae5ed92e32746be6e5aae85a782c1440159385d0021f3990fb44cf84cb2
SHA5122de89b18d9791675e32b1e55446b148fd9ba2d571d2df30bf5639249a090d46aa6995c9c4de2eea53c72d7fe7f2e91af7f146df4b10a9e6be5655b4c7683b332