Analysis
-
max time kernel
142s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2024, 20:31
Static task
static1
Behavioral task
behavioral1
Sample
e008818c75643d82199e31c9505244d5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e008818c75643d82199e31c9505244d5.exe
Resource
win10v2004-20240226-en
General
-
Target
e008818c75643d82199e31c9505244d5.exe
-
Size
6.7MB
-
MD5
e008818c75643d82199e31c9505244d5
-
SHA1
aadac5ec4b66f1439b8c58958f7c1e4c4ebe5cf6
-
SHA256
817d3154bc938d5d3ae63006bca766135a2c3d2bf67d3049c4bf445e9ed4e7a9
-
SHA512
cd77edf95bba8715a6bb737c0a7c583d72a910c968eb8beaecb7b63ec9f9cb76d5bf872f1515dc7653530015df4a1c63562d186c20dc4d176edd53b7a03736ca
-
SSDEEP
196608:uG79v1os23eAwCUzHyA24oMTB6kB97fSh5daKfG1:uGd6e2U7B24oI6k/7fWf7G1
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation e008818c75643d82199e31c9505244d5.exe -
Executes dropped EXE 1 IoCs
pid Process 3436 dllhost.exe -
Loads dropped DLL 2 IoCs
pid Process 3436 dllhost.exe 3436 dllhost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Users\\Admin\\AppData\\Local\\dllhost.exe\"" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DllHost = "C:\\Users\\Admin\\AppData\\Local\\dllhost.exe" dllhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\Local Settings e008818c75643d82199e31c9505244d5.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2584 reg.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 5056 e008818c75643d82199e31c9505244d5.exe 5056 e008818c75643d82199e31c9505244d5.exe 5056 e008818c75643d82199e31c9505244d5.exe 5056 e008818c75643d82199e31c9505244d5.exe 5056 e008818c75643d82199e31c9505244d5.exe 5056 e008818c75643d82199e31c9505244d5.exe 5056 e008818c75643d82199e31c9505244d5.exe 5056 e008818c75643d82199e31c9505244d5.exe 5056 e008818c75643d82199e31c9505244d5.exe 5056 e008818c75643d82199e31c9505244d5.exe 5056 e008818c75643d82199e31c9505244d5.exe 5056 e008818c75643d82199e31c9505244d5.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 1648 7zFM.exe Token: 35 1648 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1648 7zFM.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3436 dllhost.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 5056 wrote to memory of 3256 5056 e008818c75643d82199e31c9505244d5.exe 89 PID 5056 wrote to memory of 3256 5056 e008818c75643d82199e31c9505244d5.exe 89 PID 5056 wrote to memory of 3256 5056 e008818c75643d82199e31c9505244d5.exe 89 PID 3256 wrote to memory of 1312 3256 cmd.exe 91 PID 3256 wrote to memory of 1312 3256 cmd.exe 91 PID 3256 wrote to memory of 1312 3256 cmd.exe 91 PID 1312 wrote to memory of 2584 1312 cmd.exe 93 PID 1312 wrote to memory of 2584 1312 cmd.exe 93 PID 1312 wrote to memory of 2584 1312 cmd.exe 93 PID 5056 wrote to memory of 3436 5056 e008818c75643d82199e31c9505244d5.exe 94 PID 5056 wrote to memory of 3436 5056 e008818c75643d82199e31c9505244d5.exe 94 PID 5056 wrote to memory of 3436 5056 e008818c75643d82199e31c9505244d5.exe 94 PID 5056 wrote to memory of 1648 5056 e008818c75643d82199e31c9505244d5.exe 95 PID 5056 wrote to memory of 1648 5056 e008818c75643d82199e31c9505244d5.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\e008818c75643d82199e31c9505244d5.exe"C:\Users\Admin\AppData\Local\Temp\e008818c75643d82199e31c9505244d5.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\run.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V dllhost /D "\"C:\Users\Admin\AppData\Local\dllhost.exe\"" /f3⤵
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V dllhost /D "\"C:\Users\Admin\AppData\Local\dllhost.exe\"" /f4⤵
- Adds Run key to start application
- Modifies registry key
PID:2584
-
-
-
-
C:\Users\Admin\AppData\Local\dllhost.exe"C:\Users\Admin\AppData\Local\dllhost.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3436
-
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\3.rar"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.4MB
MD5fb7ba3e57ae6f9624427b5a2b698b625
SHA13412143d235e597f773b2f5e7f9534eef324d900
SHA256a43bfa5fe758053be69d029755b69e73ec1d56eb3dc5525249c4137235fe05c5
SHA512e57eac32135622959513b4f2ec289ea57d9a662a7d48876e7022f75bc36881353ea32bac5e8f16ff719f8b0553f787abc282871b0c707dae53f0e52305d86748
-
Filesize
144B
MD587b7f8ab243669deb60ef571f05e17a4
SHA1b9e20abe8e7bb4ff6b00c20695d88c2b7410d386
SHA256b19841d19d8dffc21449458e64fa279128c289c5e394fdbbb1efc43e7809f794
SHA5126524187cd49b7080813cdd4a1a5301f0393c0a3e2e161a813249e9389ee773dbce38eecf8f0cbf54ccbdfb39915afc2df9c675e176465546beab2b9336b5cf5e
-
Filesize
272KB
MD57f32d39f68d683b303454aec93df0ff7
SHA148d4556bbfb2c55e0febc2023c666479097076e2
SHA2561e4664ecd00c201b630b4a056355d28f850922771aad19ee2980490b80ed1836
SHA512e75e59f90dfb4fb556de079b808fa086d1270c643044ea817993db022ebdf72662cb885aaa564890f8cc5af4d04c1a69586d2f0faabcfe7ec366fb8a0600b164
-
Filesize
532KB
MD58a1ffad4644a7aa55839c5163ff142c9
SHA1fa59681102b5549bfa913d5bdb654a66da231491
SHA2563df334ba9d737a7eb064f5ec8284e60a712c42cd65a9fbf3c5b8a8f468cbf3f6
SHA5121d7db9015f20f4ee2e388ff42803e6b3d4868a4e3abe56f90f57258bddef1cb14ac5341712dbd1e67250001fa60bbb14c2958b383cd3299325fb9ddb4802cd8b