Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
02-02-2024 05:41
Behavioral task
behavioral1
Sample
88b328a1ccd518514da2fe88c61bfee2.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
88b328a1ccd518514da2fe88c61bfee2.exe
Resource
win10v2004-20231215-en
General
-
Target
88b328a1ccd518514da2fe88c61bfee2.exe
-
Size
364KB
-
MD5
88b328a1ccd518514da2fe88c61bfee2
-
SHA1
594b94463da34d5b23068a0c37197989728a243a
-
SHA256
0fd0899e365646ef59c5971addf8666f066015bfe400d7977291ebb145f9937e
-
SHA512
cc16ea812fa3deac3418e1c48a6eef398f609958178ccc85152a91f90d48796f9aef0c7c32a6350fab96fee742f97d47dc29347296fd126d921ed8bb16ba1d08
-
SSDEEP
6144:Xn8ukcbLviSGqJjW8lE0crUTMX+82IXpW0vH66RVas3Gmxq2/2eW/ZDUp/fIIbGi:Xn8HcbL6Sdvu0YUTk1ZW0vH66vW92/Cu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ekzo.exepid process 804 ekzo.exe -
Loads dropped DLL 2 IoCs
Processes:
88b328a1ccd518514da2fe88c61bfee2.exepid process 2356 88b328a1ccd518514da2fe88c61bfee2.exe 2356 88b328a1ccd518514da2fe88c61bfee2.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Acvoe\ekzo.exe upx C:\Users\Admin\AppData\Roaming\Acvoe\ekzo.exe upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
ekzo.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\{F08D48C8-DA76-AD4E-F540-ECC2E1DBCFDF} = "C:\\Users\\Admin\\AppData\\Roaming\\Acvoe\\ekzo.exe" ekzo.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
88b328a1ccd518514da2fe88c61bfee2.exedescription pid process target process PID 2356 set thread context of 1864 2356 88b328a1ccd518514da2fe88c61bfee2.exe cmd.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process 1512 1864 WerFault.exe -
Processes:
88b328a1ccd518514da2fe88c61bfee2.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Privacy 88b328a1ccd518514da2fe88c61bfee2.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 88b328a1ccd518514da2fe88c61bfee2.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
Processes:
ekzo.exepid process 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe 804 ekzo.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
88b328a1ccd518514da2fe88c61bfee2.exedescription pid process Token: SeSecurityPrivilege 2356 88b328a1ccd518514da2fe88c61bfee2.exe Token: SeSecurityPrivilege 2356 88b328a1ccd518514da2fe88c61bfee2.exe Token: SeSecurityPrivilege 2356 88b328a1ccd518514da2fe88c61bfee2.exe -
Suspicious use of WriteProcessMemory 52 IoCs
Processes:
88b328a1ccd518514da2fe88c61bfee2.exeekzo.execmd.exedescription pid process target process PID 2356 wrote to memory of 804 2356 88b328a1ccd518514da2fe88c61bfee2.exe ekzo.exe PID 2356 wrote to memory of 804 2356 88b328a1ccd518514da2fe88c61bfee2.exe ekzo.exe PID 2356 wrote to memory of 804 2356 88b328a1ccd518514da2fe88c61bfee2.exe ekzo.exe PID 2356 wrote to memory of 804 2356 88b328a1ccd518514da2fe88c61bfee2.exe ekzo.exe PID 804 wrote to memory of 1272 804 ekzo.exe taskhost.exe PID 804 wrote to memory of 1272 804 ekzo.exe taskhost.exe PID 804 wrote to memory of 1272 804 ekzo.exe taskhost.exe PID 804 wrote to memory of 1272 804 ekzo.exe taskhost.exe PID 804 wrote to memory of 1272 804 ekzo.exe taskhost.exe PID 804 wrote to memory of 1340 804 ekzo.exe Dwm.exe PID 804 wrote to memory of 1340 804 ekzo.exe Dwm.exe PID 804 wrote to memory of 1340 804 ekzo.exe Dwm.exe PID 804 wrote to memory of 1340 804 ekzo.exe Dwm.exe PID 804 wrote to memory of 1340 804 ekzo.exe Dwm.exe PID 804 wrote to memory of 1372 804 ekzo.exe Explorer.EXE PID 804 wrote to memory of 1372 804 ekzo.exe Explorer.EXE PID 804 wrote to memory of 1372 804 ekzo.exe Explorer.EXE PID 804 wrote to memory of 1372 804 ekzo.exe Explorer.EXE PID 804 wrote to memory of 1372 804 ekzo.exe Explorer.EXE PID 804 wrote to memory of 1968 804 ekzo.exe DllHost.exe PID 804 wrote to memory of 1968 804 ekzo.exe DllHost.exe PID 804 wrote to memory of 1968 804 ekzo.exe DllHost.exe PID 804 wrote to memory of 1968 804 ekzo.exe DllHost.exe PID 804 wrote to memory of 1968 804 ekzo.exe DllHost.exe PID 804 wrote to memory of 2356 804 ekzo.exe 88b328a1ccd518514da2fe88c61bfee2.exe PID 804 wrote to memory of 2356 804 ekzo.exe 88b328a1ccd518514da2fe88c61bfee2.exe PID 804 wrote to memory of 2356 804 ekzo.exe 88b328a1ccd518514da2fe88c61bfee2.exe PID 804 wrote to memory of 2356 804 ekzo.exe 88b328a1ccd518514da2fe88c61bfee2.exe PID 804 wrote to memory of 2356 804 ekzo.exe 88b328a1ccd518514da2fe88c61bfee2.exe PID 2356 wrote to memory of 1864 2356 88b328a1ccd518514da2fe88c61bfee2.exe cmd.exe PID 2356 wrote to memory of 1864 2356 88b328a1ccd518514da2fe88c61bfee2.exe cmd.exe PID 2356 wrote to memory of 1864 2356 88b328a1ccd518514da2fe88c61bfee2.exe cmd.exe PID 2356 wrote to memory of 1864 2356 88b328a1ccd518514da2fe88c61bfee2.exe cmd.exe PID 2356 wrote to memory of 1864 2356 88b328a1ccd518514da2fe88c61bfee2.exe cmd.exe PID 2356 wrote to memory of 1864 2356 88b328a1ccd518514da2fe88c61bfee2.exe cmd.exe PID 2356 wrote to memory of 1864 2356 88b328a1ccd518514da2fe88c61bfee2.exe cmd.exe PID 2356 wrote to memory of 1864 2356 88b328a1ccd518514da2fe88c61bfee2.exe cmd.exe PID 2356 wrote to memory of 1864 2356 88b328a1ccd518514da2fe88c61bfee2.exe cmd.exe PID 1864 wrote to memory of 1512 1864 cmd.exe WerFault.exe PID 1864 wrote to memory of 1512 1864 cmd.exe WerFault.exe PID 1864 wrote to memory of 1512 1864 cmd.exe WerFault.exe PID 1864 wrote to memory of 1512 1864 cmd.exe WerFault.exe PID 804 wrote to memory of 380 804 ekzo.exe conhost.exe PID 804 wrote to memory of 380 804 ekzo.exe conhost.exe PID 804 wrote to memory of 380 804 ekzo.exe conhost.exe PID 804 wrote to memory of 380 804 ekzo.exe conhost.exe PID 804 wrote to memory of 380 804 ekzo.exe conhost.exe PID 804 wrote to memory of 1512 804 ekzo.exe WerFault.exe PID 804 wrote to memory of 1512 804 ekzo.exe WerFault.exe PID 804 wrote to memory of 1512 804 ekzo.exe WerFault.exe PID 804 wrote to memory of 1512 804 ekzo.exe WerFault.exe PID 804 wrote to memory of 1512 804 ekzo.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\88b328a1ccd518514da2fe88c61bfee2.exe"C:\Users\Admin\AppData\Local\Temp\88b328a1ccd518514da2fe88c61bfee2.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpe020d382.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1864
-
-
C:\Users\Admin\AppData\Roaming\Acvoe\ekzo.exe"C:\Users\Admin\AppData\Roaming\Acvoe\ekzo.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:804
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1968
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1372
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1340
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1864 -s 1121⤵
- Program crash
PID:1512
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-72238316479261442616869617291388848372449990717-1742936445221381447807014376"1⤵PID:380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
364KB
MD589e38462934f3e4b2851e4d10496cc68
SHA1a150f1a93883abcf3bd9fcfaccc1754e0bbd98dc
SHA256d92423038001bc74a848c4defe11f9ca99f51836e9a9717e6b99c39e894d1c8b
SHA51265c7ec5a6fafe98b76c8139419967b63404f752b6cc4eadc9c99429405bf243267366aaae8f0df0375d555e5ebd2995e4053723056313fdc9d7cedde0788bab1
-
Filesize
225KB
MD585f943eaa44212d0e4d837dfdea8003a
SHA11616b815eddb4e513d2e789b51bb63deb0c9776a
SHA25687748b42432690060e34ffa5db97f01cba312ead1fe240afcbc412ab9f2812c7
SHA512e1158c09e43e870d2d5061702e39d15826295cdb4e366f08881f820cc3ddc71d3b03f8441a1e6a6c7fd557054fc16dd54deecdf1d72dc46a455d9035cc262006
-
Filesize
366B
MD5d6936e39b89db0671880e5976968a1d6
SHA16b1147c9d57898b0da79b6b1c9d8c0a960766388
SHA256262e6ae5ed92e32746be6e5aae85a782c1440159385d0021f3990fb44cf84cb2
SHA5122de89b18d9791675e32b1e55446b148fd9ba2d571d2df30bf5639249a090d46aa6995c9c4de2eea53c72d7fe7f2e91af7f146df4b10a9e6be5655b4c7683b332