Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25-02-2024 12:20
Static task
static1
Behavioral task
behavioral1
Sample
a3c3e5fd502b69388e1df82e356bbe77.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a3c3e5fd502b69388e1df82e356bbe77.exe
Resource
win10v2004-20240221-en
General
-
Target
a3c3e5fd502b69388e1df82e356bbe77.exe
-
Size
4.6MB
-
MD5
a3c3e5fd502b69388e1df82e356bbe77
-
SHA1
a609984ae142bff0ad0dac288b13056807ab25d5
-
SHA256
d2b7c2e88aff66c0d0722fdb3500c3904784f18bbb1ce695bf81026b8725b9c8
-
SHA512
6577a492fdc734784ac76f8e2bdd334841b68ff23fc45049fd3ea3695b3e7bc535bb96ffd1db6e2cb5e4aefaeaedd3ada9aee41b9da6ae3fedff80283e38aa1e
-
SSDEEP
98304:PX4KEa+NIeFBxuxf9CwuaXcy+09tTs8ZPE7uosyazx14:vB+FFBxuxFG6r+6O6osya0
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2096 a3c3e5fd502b69388e1df82e356bbe77.tmp 1896 Eius.exe -
Loads dropped DLL 1 IoCs
pid Process 2096 a3c3e5fd502b69388e1df82e356bbe77.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 14 IoCs
description ioc Process File created C:\Program Files (x86)\Est\is-KP1DP.tmp a3c3e5fd502b69388e1df82e356bbe77.tmp File created C:\Program Files (x86)\Est\is-5VMRP.tmp a3c3e5fd502b69388e1df82e356bbe77.tmp File created C:\Program Files (x86)\Est\enim\is-3PM30.tmp a3c3e5fd502b69388e1df82e356bbe77.tmp File created C:\Program Files (x86)\Est\is-HRTTS.tmp a3c3e5fd502b69388e1df82e356bbe77.tmp File created C:\Program Files (x86)\Est\is-5PT13.tmp a3c3e5fd502b69388e1df82e356bbe77.tmp File opened for modification C:\Program Files (x86)\Est\unins000.dat a3c3e5fd502b69388e1df82e356bbe77.tmp File created C:\Program Files (x86)\Est\unins000.dat a3c3e5fd502b69388e1df82e356bbe77.tmp File created C:\Program Files (x86)\Est\enim\is-0RJ86.tmp a3c3e5fd502b69388e1df82e356bbe77.tmp File created C:\Program Files (x86)\Est\enim\is-SJ4FD.tmp a3c3e5fd502b69388e1df82e356bbe77.tmp File created C:\Program Files (x86)\Est\is-U8M7I.tmp a3c3e5fd502b69388e1df82e356bbe77.tmp File created C:\Program Files (x86)\Est\is-A8ISS.tmp a3c3e5fd502b69388e1df82e356bbe77.tmp File created C:\Program Files (x86)\Est\enim\is-7LRE0.tmp a3c3e5fd502b69388e1df82e356bbe77.tmp File created C:\Program Files (x86)\Est\enim\is-S3VLN.tmp a3c3e5fd502b69388e1df82e356bbe77.tmp File opened for modification C:\Program Files (x86)\Est\Eius.exe a3c3e5fd502b69388e1df82e356bbe77.tmp -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2096 a3c3e5fd502b69388e1df82e356bbe77.tmp 2096 a3c3e5fd502b69388e1df82e356bbe77.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2096 a3c3e5fd502b69388e1df82e356bbe77.tmp -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4360 wrote to memory of 2096 4360 a3c3e5fd502b69388e1df82e356bbe77.exe 89 PID 4360 wrote to memory of 2096 4360 a3c3e5fd502b69388e1df82e356bbe77.exe 89 PID 4360 wrote to memory of 2096 4360 a3c3e5fd502b69388e1df82e356bbe77.exe 89 PID 2096 wrote to memory of 1896 2096 a3c3e5fd502b69388e1df82e356bbe77.tmp 91 PID 2096 wrote to memory of 1896 2096 a3c3e5fd502b69388e1df82e356bbe77.tmp 91 PID 2096 wrote to memory of 1896 2096 a3c3e5fd502b69388e1df82e356bbe77.tmp 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3c3e5fd502b69388e1df82e356bbe77.exe"C:\Users\Admin\AppData\Local\Temp\a3c3e5fd502b69388e1df82e356bbe77.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\is-ER9VP.tmp\a3c3e5fd502b69388e1df82e356bbe77.tmp"C:\Users\Admin\AppData\Local\Temp\is-ER9VP.tmp\a3c3e5fd502b69388e1df82e356bbe77.tmp" /SL5="$C01A4,4101322,721408,C:\Users\Admin\AppData\Local\Temp\a3c3e5fd502b69388e1df82e356bbe77.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files (x86)\Est\Eius.exe"C:\Program Files (x86)\Est/\Eius.exe" f9f49517622b570c537e67fe0cc42ce53⤵
- Executes dropped EXE
PID:1896
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.0MB
MD5114f65f55a5fb7c6b4b041c716c97266
SHA120328a7a391078a5134ad690af0ae41ec6f942b2
SHA2561d49e2e1b5b37bb09f8b105fccdc7873b3e5127824313ef3fe363434c32b2be8
SHA5122aa5cfa61b3abd18c9ed2769d007be6091c7e7f99e88f253c98d0b09cb66273e5f27b9da142ff7c34040d2ea18bc7ac83237805d0fd5d0243ee7e6770cfb1a93
-
Filesize
2.4MB
MD53fddfbaa9d029821152e746edbabf7ce
SHA1703690b3a2377047f6755e9b5274d608791b8062
SHA256787cef456bd60075199c04ac38dd5e65291bd3a930b132538889e4dafb76fa1a
SHA512fd50e763c6523022f1be02a6a690d2a2dec4e9a73c941314b4a810bbd7605d4058c5c49c53dcbdd8fde5e6c4d2c78fcec52b5bca087cbf552bc1ce90819c4903
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63