Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05/04/2024, 12:46

General

  • Target

    easypanel-iis7-1.2.2-x64.exe

  • Size

    326KB

  • MD5

    17ce44a8181ac75fe9405baac9082609

  • SHA1

    fb4776761783c63779d5e3f32f32f5fed845c692

  • SHA256

    6d30614f604753572d48cc9e9f50726c1d9f715632e8437247d2b4a409cedad7

  • SHA512

    1cdef1844fb244a8b9f4d18ba7d58e2844343c817812fa6ad355fa67a908f4001e0140db773aa753b9ae4333376ca0c22109d09f75444a1ca46ba77439d00b33

  • SSDEEP

    6144:9/QF8Dz073tGyuWEqSCumIUCLLwlAtiasLnnrMsoQ:1QFaz073tGH2umIUCLLw6ti3LniQ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\easypanel-iis7-1.2.2-x64.exe
    "C:\Users\Admin\AppData\Local\Temp\easypanel-iis7-1.2.2-x64.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\Users\Admin\AppData\Local\Temp\is-0BNH1.tmp\easypanel-iis7-1.2.2-x64.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-0BNH1.tmp\easypanel-iis7-1.2.2-x64.tmp" /SL5="$70122,89524,54272,C:\Users\Admin\AppData\Local\Temp\easypanel-iis7-1.2.2-x64.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2552
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.kanglesoft.com/forum-2-1.html
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2540
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2540 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2576

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          a5abcbd468fb320d172becd401b7641e

          SHA1

          77bd4799ecae09cbbdc5de85d4cefbb234b3ad39

          SHA256

          2ae119dbf61b7c8a6d3391ade549c07765b755a657c52c046a5583d6c3818e86

          SHA512

          8be6b8b5e710de3817875639b3efe83bd9ddeee79b31ec2a60f61fc33f691102dbbc40bce979734d662ee613e359a47ff4a33223e36a3af52f6babf63c045f2e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          03b971bb25c831624ca0b0addf8c78d8

          SHA1

          ea8e624f8c9fdc550c1179b545cf3f2f096b5e93

          SHA256

          aa00d1ad75b94d2bef3ff54953137103e52675b0a7e03fdd122f665bdfb8a345

          SHA512

          9d02ac205135715b6683b4c7a223390492ddaa5f37358e4685e1e4fa8f2456290e014ee9a2cb977109aeecdee3ef938fa944bc770940b78708e7f8eabdc65ff3

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          f53fbe91b96b705f708dc6e7db6fb2a7

          SHA1

          2cf15b9f50d22c3c87a524e17172140f30daeb3e

          SHA256

          e0ec6198a2690b081ca62ee53fd890e816e7aa4fd2c9a98468c699a5a5942550

          SHA512

          512900a1a06d39a1ee2c5689d3b97b667528709b26cfa4a085481d2fce2691622fbd7d2ec402c1de9fd0b0d36e02aedbe452da9bf795671e7d1eea88b7e2926f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          662a371aa83eb179bc570cc97750278e

          SHA1

          05c44d139e6e6b5e90c9f246561455402e455f82

          SHA256

          9573a81a5a08c2745d0e2f792eee752cf7d4376454db9327f80ba3e0843dfb7f

          SHA512

          a5606eba4d1181c0415009b2ea7f56815dd5bb7bb95c4aaaeebadf16967cf8f936ee7e2c6f32019ef62e98b099803d6cbb1f3caf2b8db18991ea1702ba3be97e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          9a49b3aac4a1f8fcb612bd7a2fc685de

          SHA1

          a326cb44480ecdc2b3fec8174b3f495689dc8c96

          SHA256

          17d60c506ec8b25844d7d847e79325dbcf9c8fdd8f531e4ee48fcc71b43391ff

          SHA512

          e9ac442b215487957618e2526e1980c70a685af93155562820c2d7a1bad5ea5f24cd7e2f547abb05bad882b9d6b5ae609050d124af460d90e67005046758fba6

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          224244279c36b31e99adff7c9dc5ff1d

          SHA1

          ed7ef338c09632b1846e7962d34079dc37fcf3f6

          SHA256

          f60f402ba9ec272c629afa901b5733ed6b23051ad311e14d832e90ed81443eff

          SHA512

          c859b5be89ab205c7c2b2e4cdcb0969f322595222be482780c47cfe5b01c766d20c65813965a25ffe4c834894e29cf8fca482f1fa7a5a3e02e6a5ddd90934231

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          9d933f1b5347c550b5561b4df14adfac

          SHA1

          a942160b10c9dd26a4d3e162b71ea7cc72904ccb

          SHA256

          5c2d02e6820bbaa75f0a00e45816d779e35df946a9215e5df0ee860faadb8633

          SHA512

          88fe8b5f0f3c45b879d518cd4a7b8b80244c368518de9ea41fc93e94b72e476623aad37574d497b7a6462c052fac1f9eeb7f2c25f75a0ecadc32212ff9e9d0aa

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          e7d0f46d2a7efda2c9cd5eea9b5398a7

          SHA1

          79373885a3757e0d3e7dfa4ea35e64377582f6c7

          SHA256

          91f556c87f438407cb24f7a7b2fba9f7bc634acd75f661cf96b485b4ef04cc92

          SHA512

          b47352cd71310ce93184a5e2885b83e442b2e026a0e8c72f2f87627855e018701435375d312fe1722737a37a4f3355044a272da66d4745bb9bd0c4658b5d1415

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          36bce9b723a91400fe41a44b65145fbf

          SHA1

          e524354b7df4e97435cfa5761758ceaed4c66301

          SHA256

          ce9e0f297f2ec7743de564a5123dfe40799b9244f76bc0d53224dd744cc323a6

          SHA512

          e50a541c564fbd45cef49e73dc90c98e2be2db57b1b24bc0f1cd6e7ff2a0364daeef69efcb80cc619cb4fea3c8911bf702836771d515b45c3aea5578da606383

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          614d968bedb0c6cd8377c11a560c6f33

          SHA1

          6681bbabaf63623209cf8944a70eb248c1567833

          SHA256

          8700d666378517aecc35b90c5ccc60b520250f5e56b3091bb4f5af7955af383c

          SHA512

          a1ef37fd744616fd2154f049fee6f1591680149a2fe9dcdfdfd08825872680666fd35ae5040cc443c267a0e5cb42a9c29a5453ae61d85c419e5084720e0240bf

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          f2a033f046b2ccae5251bdc164e82cc4

          SHA1

          0b68a00e5814288967f64f0eb1560f737f4ca18d

          SHA256

          32f0cc2269258b7f6f14c03d3e7b31d08297501fd1b78ea496d910534210240f

          SHA512

          601c304e880000676d359ae97bbcc5bb902c5ae3276cd118c8735f22ae6f030808696b1de8a302c9afc5bec54dc5dab4af90b045e070969e4192322521079434

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          58fe7049a18507352c6e70e35d04ff28

          SHA1

          8c91bd46fb326db1f343bd9cf90aebf502a86824

          SHA256

          fb4eed38603497fc240222c648f2ae829966c66a3356d7cee056428925a4b156

          SHA512

          bab357b791fc381a4cbbf3ce2c8acb8c04156e1ac08b03c9fdbbc2a8de26bacdb84c885378fbb20b7c83dfd080247a9c1c72849485997df2126e2d7cc1389d43

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          304aaf72b466487488f1d3514088462d

          SHA1

          9b45d953209e6f33372533617520b97df9ea3b3b

          SHA256

          c985640d36ad00b9fc5d1c67057fc86aa13efadae090d93c69f8e1535d28cb7b

          SHA512

          7af34a4376a4a10de08858ba832e69d74595b47e4e5b3c091c5820800d806caaa6b0e16727163858eab8f7c7c92973fb8231dedea52bfe3608470f88d854ab2e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          19c2a437d72a34ed89370c9e4c066432

          SHA1

          5b35322c43b715e729177253c02f93e8f0030744

          SHA256

          cb99b78a1d85d1a0627a70f2192a83bb518f42fe684995c808b9ab4a3e8d0876

          SHA512

          75014535e8644385dd0ffcf00a3531d36d65faad6e77e94dd5ff6bc414d8068262202e81702030d8f9785c93914fefce6c7ccc95092acfadec2ca49f372a16a7

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          d927bfd676f795112702d29b502edbcf

          SHA1

          4762ce27150554532a35172a7b9020c3c90d2a50

          SHA256

          1fd435f0e1c92ac4dc7b902e061923776bce30ded9cfe181b5c7d1baeb50ff78

          SHA512

          142dee5616c9c675633faa523c66801b80c586fdd1a415944c1712a718ccaa0a973ec6cb61de3196a2d5a88bc23697194e9c2ea0753197d630ede806894b08d4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          304B

          MD5

          f6430d3c4b95f3695e7fda1bae8a5d31

          SHA1

          7b27383af58ceb5a501ddda837a6608f9026a765

          SHA256

          ea9112bf424e79928b6ddc9558399504423eb04cbcb195ccdcdc8b6ef1c201a5

          SHA512

          94a161b7608801fe511257ac650f4126825af4b09e9512c13adf8c68213af80c206f3f9a524028b95ff5b3528789036f78c8b7844d6775b4f6e149e6530ad9d5

        • C:\Users\Admin\AppData\Local\Temp\Cab9EA3.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Cab9F50.tmp

          Filesize

          68KB

          MD5

          29f65ba8e88c063813cc50a4ea544e93

          SHA1

          05a7040d5c127e68c25d81cc51271ffb8bef3568

          SHA256

          1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

          SHA512

          e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

        • C:\Users\Admin\AppData\Local\Temp\Tar9F75.tmp

          Filesize

          177KB

          MD5

          435a9ac180383f9fa094131b173a2f7b

          SHA1

          76944ea657a9db94f9a4bef38f88c46ed4166983

          SHA256

          67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

          SHA512

          1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

        • \Users\Admin\AppData\Local\Temp\is-0BNH1.tmp\easypanel-iis7-1.2.2-x64.tmp

          Filesize

          689KB

          MD5

          15430669556c2062ceadd5b125e8cea7

          SHA1

          276c5f36876a783a01ef10b9df39fa0efe3e296a

          SHA256

          64db719c67988b106bf2d1a5b842445e8ff9b6436be28bcaa0b8876d330f8168

          SHA512

          2c2a87d34922d747827a2c77813ebfe9923bdd80cd4be909f8da3c8a4dc3a079c049db74c8bc36edd38663ee4635cdd0fda4f9cd2adc3b40d426066611206f39

        • \Users\Admin\AppData\Local\Temp\is-AEVRJ.tmp\_isetup\_shfoldr.dll

          Filesize

          22KB

          MD5

          92dc6ef532fbb4a5c3201469a5b5eb63

          SHA1

          3e89ff837147c16b4e41c30d6c796374e0b8e62c

          SHA256

          9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

          SHA512

          9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

        • memory/2552-498-0x0000000000400000-0x00000000004BC000-memory.dmp

          Filesize

          752KB

        • memory/2552-21-0x0000000000400000-0x00000000004BC000-memory.dmp

          Filesize

          752KB

        • memory/2552-8-0x0000000000240000-0x0000000000241000-memory.dmp

          Filesize

          4KB

        • memory/2732-500-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/2732-1-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/2732-20-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB