Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 13:43
Behavioral task
behavioral1
Sample
c0bbcc1266d11434d5a50ba752c73069.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c0bbcc1266d11434d5a50ba752c73069.exe
Resource
win10v2004-20240226-en
General
-
Target
c0bbcc1266d11434d5a50ba752c73069.exe
-
Size
14KB
-
MD5
c0bbcc1266d11434d5a50ba752c73069
-
SHA1
cc8dc01210ca021cb903181d65874373d88bc79f
-
SHA256
b510ef45ffff63592b23eed367794631fe67f1dd14e473cdcfd87ec2ab2bf825
-
SHA512
99b86e8612c0f5287c837e6fbdc41fbecf7e5314f91863fdf448a513ba728fdb710bc6c1592d9a4af1028772e2e98a4ec6c6d46dea4e6c6a3dbc80ade8ecc7dd
-
SSDEEP
192:iPonnKKesSt4q2VOtQKYpghjgR8cri+jz4GWGYOuI9kxCZfrhhTTBS+qGaIHD7Nc:YonK/sStGDg1J47vRY8BfrnlL3hVkl
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 4584 ezcronk.exe -
resource yara_rule behavioral2/memory/4988-0-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/files/0x0008000000023244-4.dat upx behavioral2/memory/4988-6-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/4584-7-0x0000000000400000-0x0000000000412000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\ezcron.dll c0bbcc1266d11434d5a50ba752c73069.exe File created C:\Windows\SysWOW64\ezcronk.exe c0bbcc1266d11434d5a50ba752c73069.exe File opened for modification C:\Windows\SysWOW64\ezcronk.exe c0bbcc1266d11434d5a50ba752c73069.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4988 wrote to memory of 4584 4988 c0bbcc1266d11434d5a50ba752c73069.exe 95 PID 4988 wrote to memory of 4584 4988 c0bbcc1266d11434d5a50ba752c73069.exe 95 PID 4988 wrote to memory of 4584 4988 c0bbcc1266d11434d5a50ba752c73069.exe 95 PID 4988 wrote to memory of 5044 4988 c0bbcc1266d11434d5a50ba752c73069.exe 107 PID 4988 wrote to memory of 5044 4988 c0bbcc1266d11434d5a50ba752c73069.exe 107 PID 4988 wrote to memory of 5044 4988 c0bbcc1266d11434d5a50ba752c73069.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0bbcc1266d11434d5a50ba752c73069.exe"C:\Users\Admin\AppData\Local\Temp\c0bbcc1266d11434d5a50ba752c73069.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\ezcronk.exeC:\Windows\system32\ezcronk.exe ˜‰2⤵
- Executes dropped EXE
PID:4584
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\c0bbcc1266d11434d5a50ba752c73069.exe.bat2⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4160 --field-trial-handle=2304,i,6987730730348465820,3913273227385401271,262144 --variations-seed-version /prefetch:81⤵PID:2616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD5483ac8ae179093ed3bb0081aa711974e
SHA111d3e01d5e4d05698db46f9f51af82fb0ad2d7d7
SHA2564a544eacff9d1cb7ea0f594917bbd4ef55bef5556df45f78c60780c1a9fd14a5
SHA5129f583d10be18107e120f53c0005e01e00fb91d12ca7694adf2e3e4fd1600f0b8007d4a37644126e4255489d15240cda0fd92ed2c9e85178a0850a2895226a354
-
Filesize
14KB
MD5c0bbcc1266d11434d5a50ba752c73069
SHA1cc8dc01210ca021cb903181d65874373d88bc79f
SHA256b510ef45ffff63592b23eed367794631fe67f1dd14e473cdcfd87ec2ab2bf825
SHA51299b86e8612c0f5287c837e6fbdc41fbecf7e5314f91863fdf448a513ba728fdb710bc6c1592d9a4af1028772e2e98a4ec6c6d46dea4e6c6a3dbc80ade8ecc7dd