Resubmissions
07/03/2024, 09:34
240307-lj9bhsgc99 707/03/2024, 09:31
240307-lhafssgc68 707/03/2024, 09:29
240307-lf3dssgc37 7Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/03/2024, 09:31
Behavioral task
behavioral1
Sample
EkexClient.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
EkexClient.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
EkexClient.exe.pyc
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
EkexClient.exe.pyc
Resource
win10v2004-20240226-en
General
-
Target
EkexClient.exe.pyc
-
Size
69KB
-
MD5
2a4c573d98e6559ddc315dfc091a841a
-
SHA1
396ec4ae1c2845a867ddd3010db5da3be86c5740
-
SHA256
ad38b897bf067494c60d592e27b36d187691b66f8fb07639c6bc436f1838d775
-
SHA512
729096e3305421e02e3d4ddb2c2094c84bd38f264c01230bb9b127b4cf75de01bbaafb9dcf7a54d1b800521d5a59b70535ec9b6de2931a15999c71e1f3d00b54
-
SSDEEP
768:0+PS3Irw/gMxvCWUL8OsvPi3K2nFcWAXTxcPdCA79/GleK1AnjdRnrBI5y:0TIrYv+SNxjlJKpVrn
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\.pyc rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\pyc_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\pyc_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2516 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2516 AcroRd32.exe 2516 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1332 wrote to memory of 1280 1332 cmd.exe 29 PID 1332 wrote to memory of 1280 1332 cmd.exe 29 PID 1332 wrote to memory of 1280 1332 cmd.exe 29 PID 1280 wrote to memory of 2516 1280 rundll32.exe 30 PID 1280 wrote to memory of 2516 1280 rundll32.exe 30 PID 1280 wrote to memory of 2516 1280 rundll32.exe 30 PID 1280 wrote to memory of 2516 1280 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\EkexClient.exe.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\EkexClient.exe.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\EkexClient.exe.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2516
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD59db2a79b0daca7d01d7a3c00dc7f5f7d
SHA14a1b5a933b530ddd296f0e81caeada5cc1a93a47
SHA2561ad47caa9b36f8adb5ed039f60c9f2f688c5aff6ffddba600ca610a48305ca29
SHA512f948e48177690645ce946ba992c068da9d1939349659f9f8422f44dc2f3189bc54ba45545de64a8275670538dd694505cc368e82d7935749c5cd9cb586a3b52a