Analysis
-
max time kernel
164s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 23:23
Static task
static1
Behavioral task
behavioral1
Sample
b5ea83a28f0548db57c3b813573dab45.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b5ea83a28f0548db57c3b813573dab45.exe
Resource
win10v2004-20240226-en
General
-
Target
b5ea83a28f0548db57c3b813573dab45.exe
-
Size
451KB
-
MD5
b5ea83a28f0548db57c3b813573dab45
-
SHA1
5df03970701d8d7b38e6305b708316bf7b340733
-
SHA256
9b29e48ed124a19195ce0aaf198f5d14f71429594fca583eca811d682a47258d
-
SHA512
f1e4c330d4ef0d8b4f8facb9e0aa2caa232639a098c70fd75c43094fc0e881d8afa58e54008be23b82a51609817ead8875402b9d3f1ec12b52cc873c1883c8d0
-
SSDEEP
12288:xK/sVCBV5yJnFbrCiXlrmPmOay0TiBlV:x2sAXyJFtdmuny77
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2332 eO06509MmPhE06509.exe -
Executes dropped EXE 1 IoCs
pid Process 2332 eO06509MmPhE06509.exe -
resource yara_rule behavioral2/memory/2868-1-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/2868-5-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/2868-14-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/2332-25-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/2332-32-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/2332-37-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/2332-38-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\eO06509MmPhE06509 = "C:\\ProgramData\\eO06509MmPhE06509\\eO06509MmPhE06509.exe" eO06509MmPhE06509.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2868 b5ea83a28f0548db57c3b813573dab45.exe 2868 b5ea83a28f0548db57c3b813573dab45.exe 2868 b5ea83a28f0548db57c3b813573dab45.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2868 b5ea83a28f0548db57c3b813573dab45.exe Token: SeDebugPrivilege 2332 eO06509MmPhE06509.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2332 eO06509MmPhE06509.exe 2332 eO06509MmPhE06509.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2332 2868 b5ea83a28f0548db57c3b813573dab45.exe 91 PID 2868 wrote to memory of 2332 2868 b5ea83a28f0548db57c3b813573dab45.exe 91 PID 2868 wrote to memory of 2332 2868 b5ea83a28f0548db57c3b813573dab45.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5ea83a28f0548db57c3b813573dab45.exe"C:\Users\Admin\AppData\Local\Temp\b5ea83a28f0548db57c3b813573dab45.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\ProgramData\eO06509MmPhE06509\eO06509MmPhE06509.exe"C:\ProgramData\eO06509MmPhE06509\eO06509MmPhE06509.exe" "C:\Users\Admin\AppData\Local\Temp\b5ea83a28f0548db57c3b813573dab45.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5f14c6f62c9488f8b7543516e1dc7f9d2
SHA106dcb54c87732888c84cddc4523f9639428eba2a
SHA25650773f41f22a4fea283ce938e0796103a1771b1ff13ac8edbc49af727d6e434d
SHA5124268ccc2098a2e231a1096d86d22a13b8fb4bd70e38789a9a19f817e5c206c8a6c66db881cd97d721b707aa621bfe41b14cc06d9bf4e0a722c2ef9ba15ef66c0
-
Filesize
451KB
MD59b438de360023f7b2e596322b0b1bf6c
SHA1a9517456ab9238d0277c0bc8fcb2e970cac9632b
SHA25692f487763460903da7c01d36bbf7d4f40a141705f0f595b8f667c170a9d631f7
SHA51254e972e3c9798eb6926aee8b4e003ae18882284e74d70d5b12043680294ecd1d6fcc1db098da17a3bb6ad2a4ccb168afd8738a0c82f93bb02b4127ed182d01b7