Overview
overview
6Static
static
3Evon.zip
windows7-x64
1Evon.zip
windows10-2004-x64
1Evon.exe
windows7-x64
1Evon.exe
windows10-2004-x64
1Launcher.bat
windows7-x64
1Launcher.bat
windows10-2004-x64
6README.txt
windows7-x64
1README.txt
windows10-2004-x64
1config
windows7-x64
1config
windows10-2004-x64
1lua51.dll
windows7-x64
3lua51.dll
windows10-2004-x64
3Analysis
-
max time kernel
452s -
max time network
1172s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-04-2024 06:25
Static task
static1
Behavioral task
behavioral1
Sample
Evon.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Evon.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Evon.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Evon.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Launcher.bat
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Launcher.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
README.txt
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
README.txt
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
config
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
config
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
lua51.dll
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
lua51.dll
Resource
win10v2004-20240226-en
General
-
Target
Launcher.bat
-
Size
540B
-
MD5
8a73c96ff34b3781522dd9993f483e95
-
SHA1
92aeb01de1efacc47795a13a929f4e64ba250f67
-
SHA256
800b892d045aa373322d1a21f83a2616baae2a5c468096c502114f975b3c7271
-
SHA512
8205e5c36a18ef1aff1c453ec0910a9234105351b52f4478c8d44dd7a3e07e5c43551b89f7cc176d47c99689f6b736d2bf54a45da6c1b1bcda46e4eac049f173
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 56 pastebin.com 57 pastebin.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4108 wrote to memory of 1276 4108 cmd.exe 87 PID 4108 wrote to memory of 1276 4108 cmd.exe 87 PID 4108 wrote to memory of 2404 4108 cmd.exe 88 PID 4108 wrote to memory of 2404 4108 cmd.exe 88 PID 4108 wrote to memory of 2404 4108 cmd.exe 88
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Launcher.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\system32\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"2⤵PID:1276
-
-
C:\Users\Admin\AppData\Local\Temp\Evon.exeEvon.exe config2⤵PID:2404
-