Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
27-03-2024 00:21
Static task
static1
Behavioral task
behavioral1
Sample
e05182f3a5194e2bbe5e7cba751c27c0.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
e05182f3a5194e2bbe5e7cba751c27c0.exe
Resource
win10v2004-20240226-en
General
-
Target
e05182f3a5194e2bbe5e7cba751c27c0.exe
-
Size
391KB
-
MD5
e05182f3a5194e2bbe5e7cba751c27c0
-
SHA1
47ea47e9e5a72e5d9c4b00220648fc1701b3b596
-
SHA256
eb11898e23135250438c2b969a53ef90774e3c8594672addbd34e859f51bdbb8
-
SHA512
6050847d66f6baba79c010041be7104d8e2c1a388d072ac5ad58940ff2704600eecbdac70a34dad5228906d010568b61b77c53b5577fd37c27ff32cda57c0a40
-
SSDEEP
6144:sNwVZorchG8e9fhGtz9mFSLtCV85ExKx3oN0KkjH4zkIiJ6nDInEppBb1tcKL:tVqrchje9f4Tb6gExlrKE/w27d1tcU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3032 e05182f3a5194e2bbe5e7cba751c27c0.exe -
resource yara_rule behavioral1/memory/1920-4-0x0000000000400000-0x0000000000501000-memory.dmp upx behavioral1/memory/1920-6-0x0000000000400000-0x0000000000501000-memory.dmp upx behavioral1/memory/1920-8-0x0000000000400000-0x0000000000501000-memory.dmp upx behavioral1/memory/1920-13-0x0000000000400000-0x0000000000501000-memory.dmp upx behavioral1/memory/1920-14-0x0000000000400000-0x0000000000501000-memory.dmp upx behavioral1/memory/1920-15-0x0000000000400000-0x0000000000501000-memory.dmp upx behavioral1/memory/1920-23-0x0000000000400000-0x0000000000501000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2304 set thread context of 1920 2304 e05182f3a5194e2bbe5e7cba751c27c0.exe 28 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\e05182f3a5194e2bbe5e7cba751c27c0.exe e05182f3a5194e2bbe5e7cba751c27c0.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\hardware\DESCRIPTION\System\CentralProcessor\0 e05182f3a5194e2bbe5e7cba751c27c0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier e05182f3a5194e2bbe5e7cba751c27c0.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2304 e05182f3a5194e2bbe5e7cba751c27c0.exe 3032 e05182f3a5194e2bbe5e7cba751c27c0.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2304 e05182f3a5194e2bbe5e7cba751c27c0.exe 3032 e05182f3a5194e2bbe5e7cba751c27c0.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2304 wrote to memory of 1920 2304 e05182f3a5194e2bbe5e7cba751c27c0.exe 28 PID 2304 wrote to memory of 1920 2304 e05182f3a5194e2bbe5e7cba751c27c0.exe 28 PID 2304 wrote to memory of 1920 2304 e05182f3a5194e2bbe5e7cba751c27c0.exe 28 PID 2304 wrote to memory of 1920 2304 e05182f3a5194e2bbe5e7cba751c27c0.exe 28 PID 2304 wrote to memory of 1920 2304 e05182f3a5194e2bbe5e7cba751c27c0.exe 28 PID 2304 wrote to memory of 1920 2304 e05182f3a5194e2bbe5e7cba751c27c0.exe 28 PID 2304 wrote to memory of 1920 2304 e05182f3a5194e2bbe5e7cba751c27c0.exe 28 PID 2304 wrote to memory of 1920 2304 e05182f3a5194e2bbe5e7cba751c27c0.exe 28 PID 1920 wrote to memory of 3032 1920 e05182f3a5194e2bbe5e7cba751c27c0.exe 29 PID 1920 wrote to memory of 3032 1920 e05182f3a5194e2bbe5e7cba751c27c0.exe 29 PID 1920 wrote to memory of 3032 1920 e05182f3a5194e2bbe5e7cba751c27c0.exe 29 PID 1920 wrote to memory of 3032 1920 e05182f3a5194e2bbe5e7cba751c27c0.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\e05182f3a5194e2bbe5e7cba751c27c0.exe"C:\Users\Admin\AppData\Local\Temp\e05182f3a5194e2bbe5e7cba751c27c0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\e05182f3a5194e2bbe5e7cba751c27c0.exeC:\Users\Admin\AppData\Local\Temp\e05182f3a5194e2bbe5e7cba751c27c0.exe2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\e05182f3a5194e2bbe5e7cba751c27c0.exeC:\Windows\e05182f3a5194e2bbe5e7cba751c27c0.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3032
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
391KB
MD5e05182f3a5194e2bbe5e7cba751c27c0
SHA147ea47e9e5a72e5d9c4b00220648fc1701b3b596
SHA256eb11898e23135250438c2b969a53ef90774e3c8594672addbd34e859f51bdbb8
SHA5126050847d66f6baba79c010041be7104d8e2c1a388d072ac5ad58940ff2704600eecbdac70a34dad5228906d010568b61b77c53b5577fd37c27ff32cda57c0a40