Analysis

  • max time kernel
    145s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240319-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/04/2024, 14:51

General

  • Target

    EzSSStation.exe

  • Size

    72KB

  • MD5

    79b1b0b86fcdda468bd40e16823e18b2

  • SHA1

    2c699b7d22a15ed2070c7c9debae55413a878c85

  • SHA256

    10c5bd157ff5ab79a45b4ffbdf48ee44b6a0119090a52bb95b0dff3c0f9fd4f6

  • SHA512

    5d101a805188fdb159e25cacb70d68f9507cc590cee1aa58f883db1342170bfa6b918ec452de100ee73b82fe0fe05a82dd58662f935130b89af1515d9e7195e7

  • SSDEEP

    1536:wlxujwJ05wBd4TiJ1AkFrgVZR7Llk5jOZrDGcGU01ASCm29zvONLS:wzujwAwn4QNNAl6jOZwz29CpS

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\EzSSStation.exe
    "C:\Users\Admin\AppData\Local\Temp\EzSSStation.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4372
    • C:\Users\Admin\AppData\Local\Temp\EzSSStation.exe
      "C:\Users\Admin\AppData\Local\Temp\EzSSStation.exe" /T
      2⤵
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3940
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3684 --field-trial-handle=2244,i,11986678581565715302,451159359636456336,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:3008

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/3940-3-0x0000000002350000-0x00000000024C5000-memory.dmp

            Filesize

            1.5MB

          • memory/3940-4-0x00000000026F0000-0x00000000026F1000-memory.dmp

            Filesize

            4KB

          • memory/3940-7-0x0000000000400000-0x0000000000418000-memory.dmp

            Filesize

            96KB

          • memory/3940-8-0x0000000002350000-0x00000000024C5000-memory.dmp

            Filesize

            1.5MB

          • memory/3940-57-0x0000000002350000-0x00000000024C5000-memory.dmp

            Filesize

            1.5MB

          • memory/4372-0-0x0000000002620000-0x0000000002795000-memory.dmp

            Filesize

            1.5MB

          • memory/4372-1-0x0000000000710000-0x0000000000711000-memory.dmp

            Filesize

            4KB

          • memory/4372-5-0x0000000000400000-0x0000000000418000-memory.dmp

            Filesize

            96KB

          • memory/4372-6-0x0000000002620000-0x0000000002795000-memory.dmp

            Filesize

            1.5MB

          • memory/4372-13-0x0000000000710000-0x0000000000711000-memory.dmp

            Filesize

            4KB

          • memory/4372-15-0x0000000002620000-0x0000000002795000-memory.dmp

            Filesize

            1.5MB