Analysis
-
max time kernel
20s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
27/04/2024, 04:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
EOD-AIO.exe
Resource
win7-20240220-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
EOD-AIO.exe
Resource
win10v2004-20240419-en
4 signatures
150 seconds
General
-
Target
EOD-AIO.exe
-
Size
23.4MB
-
MD5
9e0e558fec8d96770cea6bf71cebe6ed
-
SHA1
e31be4a323d010337d83c28568e36ab663256543
-
SHA256
75b7fef7f8a5dc6e0e57c8b070fac59f896d0ddbb17605d8ca20a56c4d51244a
-
SHA512
b1310c9f02b9de5e89eb3dfb88e278e255d72ec502175339157ca3e457309ab61fc335aee05d4c5cbd9c6e13ac8397bd74ad2c2bc2fcda6e1e1e121b3dde15ad
-
SSDEEP
393216:X3gPES17Al/jg3ani38EuAAcO2r71NsAVHcVylgWT4KlRjZDu1wTM:X30ESdApkK08Ei0rPseHc4GWMWlDu1
Score
5/10
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3048 EOD-AIO.exe 3048 EOD-AIO.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2384 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe 3048 EOD-AIO.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2644 3048 EOD-AIO.exe 29 PID 3048 wrote to memory of 2644 3048 EOD-AIO.exe 29 PID 3048 wrote to memory of 2644 3048 EOD-AIO.exe 29 PID 2644 wrote to memory of 2652 2644 cmd.exe 30 PID 2644 wrote to memory of 2652 2644 cmd.exe 30 PID 2644 wrote to memory of 2652 2644 cmd.exe 30 PID 2644 wrote to memory of 2820 2644 cmd.exe 31 PID 2644 wrote to memory of 2820 2644 cmd.exe 31 PID 2644 wrote to memory of 2820 2644 cmd.exe 31 PID 2644 wrote to memory of 2524 2644 cmd.exe 32 PID 2644 wrote to memory of 2524 2644 cmd.exe 32 PID 2644 wrote to memory of 2524 2644 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\EOD-AIO.exe"C:\Users\Admin\AppData\Local\Temp\EOD-AIO.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\EOD-AIO.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\EOD-AIO.exe" MD53⤵PID:2652
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:2820
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:2524
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"2⤵PID:2420
-
C:\Windows\system32\cmd.execmd /C "color b && title Error && echo SSL connect error && timeout /t 5"3⤵PID:2484
-
C:\Windows\system32\timeout.exetimeout /t 54⤵
- Delays execution with timeout.exe
PID:2384
-
-
-