Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
28/04/2024, 22:39
Static task
static1
Behavioral task
behavioral1
Sample
74ff3abe98d39b31e3334d9dfc54ca518b3d4b81157b27dc17e8bb020ce4beda.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
74ff3abe98d39b31e3334d9dfc54ca518b3d4b81157b27dc17e8bb020ce4beda.exe
Resource
win10v2004-20240419-en
General
-
Target
74ff3abe98d39b31e3334d9dfc54ca518b3d4b81157b27dc17e8bb020ce4beda.exe
-
Size
72KB
-
MD5
882158117e148b5feadba0ee29642410
-
SHA1
8cc78db1cdf0dfafe579d86734921d648b4f5d56
-
SHA256
74ff3abe98d39b31e3334d9dfc54ca518b3d4b81157b27dc17e8bb020ce4beda
-
SHA512
b37fe17283843d4f75f6fa357c5b184f1e68dfd455c2d9360b28dccbd02ccb41e7da748ab47e344993f65bb335dd63902ada02614a9735f0ac7fc02ffba2dd06
-
SSDEEP
1536:xkXBH6xpNlcyUHN1w5q0bAJCvWIdGHoSIuBSdr51ZuMDrZIv:2Gzlc5HGBSHgdr1uJv
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" eamgoaxoac-usid.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" eamgoaxoac-usid.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" eamgoaxoac-usid.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" eamgoaxoac-usid.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4748505A-5247-4643-4748-505A52474643} eamgoaxoac-usid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4748505A-5247-4643-4748-505A52474643}\01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123 = "a" eamgoaxoac-usid.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4748505A-5247-4643-4748-505A52474643}\IsInstalled = "1" eamgoaxoac-usid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4748505A-5247-4643-4748-505A52474643}\StubPath = "C:\\Windows\\system32\\agnuheak.exe" eamgoaxoac-usid.exe -
Sets file execution options in registry 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe eamgoaxoac-usid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890 = "a" eamgoaxoac-usid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "C:\\Windows\\system32\\eatxumun-edeab.exe" eamgoaxoac-usid.exe -
Executes dropped EXE 2 IoCs
pid Process 2220 eamgoaxoac-usid.exe 856 eamgoaxoac-usid.exe -
Loads dropped DLL 3 IoCs
pid Process 2824 74ff3abe98d39b31e3334d9dfc54ca518b3d4b81157b27dc17e8bb020ce4beda.exe 2824 74ff3abe98d39b31e3334d9dfc54ca518b3d4b81157b27dc17e8bb020ce4beda.exe 2220 eamgoaxoac-usid.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" eamgoaxoac-usid.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" eamgoaxoac-usid.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" eamgoaxoac-usid.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" eamgoaxoac-usid.exe -
Modifies WinLogon 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B} eamgoaxoac-usid.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify eamgoaxoac-usid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345 = "a" eamgoaxoac-usid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\DLLName = "C:\\Windows\\system32\\agkeadav.dll" eamgoaxoac-usid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\Startup = "Startup" eamgoaxoac-usid.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\agkeadav.dll eamgoaxoac-usid.exe File opened for modification C:\Windows\SysWOW64\eamgoaxoac-usid.exe 74ff3abe98d39b31e3334d9dfc54ca518b3d4b81157b27dc17e8bb020ce4beda.exe File opened for modification C:\Windows\SysWOW64\eatxumun-edeab.exe eamgoaxoac-usid.exe File created C:\Windows\SysWOW64\eatxumun-edeab.exe eamgoaxoac-usid.exe File opened for modification C:\Windows\SysWOW64\agnuheak.exe eamgoaxoac-usid.exe File created C:\Windows\SysWOW64\agnuheak.exe eamgoaxoac-usid.exe File opened for modification C:\Windows\SysWOW64\agkeadav.dll eamgoaxoac-usid.exe File opened for modification C:\Windows\SysWOW64\eamgoaxoac-usid.exe eamgoaxoac-usid.exe File created C:\Windows\SysWOW64\eamgoaxoac-usid.exe 74ff3abe98d39b31e3334d9dfc54ca518b3d4b81157b27dc17e8bb020ce4beda.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 856 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe 2220 eamgoaxoac-usid.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2220 eamgoaxoac-usid.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2220 2824 74ff3abe98d39b31e3334d9dfc54ca518b3d4b81157b27dc17e8bb020ce4beda.exe 28 PID 2824 wrote to memory of 2220 2824 74ff3abe98d39b31e3334d9dfc54ca518b3d4b81157b27dc17e8bb020ce4beda.exe 28 PID 2824 wrote to memory of 2220 2824 74ff3abe98d39b31e3334d9dfc54ca518b3d4b81157b27dc17e8bb020ce4beda.exe 28 PID 2824 wrote to memory of 2220 2824 74ff3abe98d39b31e3334d9dfc54ca518b3d4b81157b27dc17e8bb020ce4beda.exe 28 PID 2220 wrote to memory of 436 2220 eamgoaxoac-usid.exe 5 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 856 2220 eamgoaxoac-usid.exe 29 PID 2220 wrote to memory of 856 2220 eamgoaxoac-usid.exe 29 PID 2220 wrote to memory of 856 2220 eamgoaxoac-usid.exe 29 PID 2220 wrote to memory of 856 2220 eamgoaxoac-usid.exe 29 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18 PID 2220 wrote to memory of 1092 2220 eamgoaxoac-usid.exe 18
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:436
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\74ff3abe98d39b31e3334d9dfc54ca518b3d4b81157b27dc17e8bb020ce4beda.exe"C:\Users\Admin\AppData\Local\Temp\74ff3abe98d39b31e3334d9dfc54ca518b3d4b81157b27dc17e8bb020ce4beda.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\eamgoaxoac-usid.exe"C:\Windows\SysWOW64\eamgoaxoac-usid.exe"3⤵
- Windows security bypass
- Modifies Installed Components in the registry
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Modifies WinLogon
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\eamgoaxoac-usid.exe--k33p4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:856
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5f37b21c00fd81bd93c89ce741a88f183
SHA1b2796500597c68e2f5638e1101b46eaf32676c1c
SHA25676cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0
SHA512252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4
-
Filesize
72KB
MD5d96fa2f5e62046097362ea59f45288c2
SHA1b73a4549d496e690e2b6d5a6434673dab40a9a8e
SHA256b077202d412fdb5d8f3cb532fe029b00ff71dee8242091884a0186b4f68e2397
SHA512ebcbb58cc9831b51b8f41d7d70505c6e13cd4bd3d1c90ce32901f968a9a300c7bd99ae881f83f6feb6345ca904e89519d21956794cf5e65c6f61163213f8fa7c
-
Filesize
73KB
MD544e873d550d9ae923db5dcb4a98e63af
SHA18556eda11de5d6fed94a7f636ffcfbbebbb21543
SHA2569db1f23863b5c14fc8b4c3b9ab3de439bdd9e81a5451a2e414e59d62a75c393c
SHA512aac0568cf7b238f8510cd5d57038fe16e062cf3f1574b16be758f70468488933190d5e55ee2021e59d5da451f98cc0d18b1bca49201fdef647581738c8a42d60
-
Filesize
70KB
MD5266f7d2134ae8d573fcdd22684a9ca0f
SHA1540cf42b3d32bc3344b192e370347a03ec62ceb5
SHA256eb3cede43674782ca4d633fae20dd48f71b15b254b1de6daf0e12525a2fb0a34
SHA512eb0f773fcfa4d1f5ff941a8cb85e0b6571abfd73cf051d1fe89edb3f35faac520b5ea2b0e0e1a0ac2357d8cc7ea7698aaa67d77febee9cdebfb1d6e8f7963ed7