Overview
overview
10Static
static
101680kb DMF...er.exe
windows7-x64
71680kb DMF...er.exe
windows10-2004-x64
7AntMem v13...64.vbs
windows7-x64
1AntMem v13...64.vbs
windows10-2004-x64
1Atlantis N...is.exe
windows7-x64
8Atlantis N...is.exe
windows10-2004-x64
7CSVboard v...rd.exe
windows7-x64
7CSVboard v...rd.exe
windows10-2004-x64
7Encopy5/encopy5.exe
windows7-x64
7Encopy5/encopy5.exe
windows10-2004-x64
7Eve/eve.exe
windows7-x64
8Eve/eve.exe
windows10-2004-x64
1FoldersRep...ep.exe
windows7-x64
9FoldersRep...ep.exe
windows10-2004-x64
9FoldersRep...t.html
windows7-x64
1FoldersRep...t.html
windows10-2004-x64
1MICROFTP/MicroFTP.exe
windows7-x64
7MICROFTP/MicroFTP.exe
windows10-2004-x64
7PDFproduce...er.exe
windows7-x64
7PDFproduce...er.exe
windows10-2004-x64
7Password G...pg.exe
windows7-x64
7Password G...pg.exe
windows10-2004-x64
7ShackUp/ShackUp.exe
windows7-x64
7ShackUp/ShackUp.exe
windows10-2004-x64
7Spread32/Spread32.exe
windows7-x64
7Spread32/Spread32.exe
windows10-2004-x64
7TheGun/THEGUN.exe
windows7-x64
1TheGun/THEGUN.exe
windows10-2004-x64
1Xcalday Ca...ay.exe
windows7-x64
7Xcalday Ca...ay.exe
windows10-2004-x64
7Xpass/xpass.dll
windows7-x64
7Xpass/xpass.dll
windows10-2004-x64
7Analysis
-
max time kernel
142s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 07:16
Behavioral task
behavioral1
Sample
1680kb DMF Floppy Office Xtort Homage 2021 Edition/100k zipper v1.21/100ziper.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1680kb DMF Floppy Office Xtort Homage 2021 Edition/100k zipper v1.21/100ziper.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
AntMem v13- Try to Free 64mb/64.vbs
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
AntMem v13- Try to Free 64mb/64.vbs
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
Atlantis Nova/Atlantis.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
Atlantis Nova/Atlantis.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
CSVboard v1.1/CSVboard.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
CSVboard v1.1/CSVboard.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
Encopy5/encopy5.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
Encopy5/encopy5.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
Eve/eve.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Eve/eve.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
FoldersReport/folrep.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
FoldersReport/folrep.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
FoldersReport/report.html
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
FoldersReport/report.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
MICROFTP/MicroFTP.exe
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
MICROFTP/MicroFTP.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
PDFproducer/PDFproducer.exe
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
PDFproducer/PDFproducer.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
Password Generator/pg.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
Password Generator/pg.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
ShackUp/ShackUp.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
ShackUp/ShackUp.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
Spread32/Spread32.exe
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
Spread32/Spread32.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
TheGun/THEGUN.exe
Resource
win7-20240215-en
Behavioral task
behavioral28
Sample
TheGun/THEGUN.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral29
Sample
Xcalday Calendar/xcalday.exe
Resource
win7-20240419-en
Behavioral task
behavioral30
Sample
Xcalday Calendar/xcalday.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
Xpass/xpass.dll
Resource
win7-20240220-en
Behavioral task
behavioral32
Sample
Xpass/xpass.dll
Resource
win10v2004-20240508-en
General
-
Target
Eve/eve.exe
-
Size
73KB
-
MD5
755d1b440f76791ef1d58d7ebb098068
-
SHA1
27f540010a6fbbdae390dce806499bcb0c096c51
-
SHA256
0fa0ee9d5c8416b622cc6a09d8dcff69d3f14ed8738a380fad3c27879b804354
-
SHA512
2ddc9341270f7bce951b2349e2a5168f6f2947c3568f134ad57b935f98090db4a2d318be94650dc8d42965d19232346e01bc19c90445b742c8c659d4e2e561a3
-
SSDEEP
1536:4Oc9V+aRuSIY2UahOI7DkcS1pUkbahMdALcURn31P46jVlBdt2qP:4Oc9kDSIY2UtI7A91pUkbahMqQUJC6vh
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 2864 rundll32.exe 7 2864 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX\OOBGameInstalled = "1" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX\ServiceLocation rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2864 2772 eve.exe 28 PID 2772 wrote to memory of 2864 2772 eve.exe 28 PID 2772 wrote to memory of 2864 2772 eve.exe 28 PID 2772 wrote to memory of 2864 2772 eve.exe 28 PID 2772 wrote to memory of 2864 2772 eve.exe 28 PID 2772 wrote to memory of 2864 2772 eve.exe 28 PID 2772 wrote to memory of 2864 2772 eve.exe 28 PID 2772 wrote to memory of 2676 2772 eve.exe 31 PID 2772 wrote to memory of 2676 2772 eve.exe 31 PID 2772 wrote to memory of 2676 2772 eve.exe 31 PID 2772 wrote to memory of 2676 2772 eve.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Eve\eve.exe"C:\Users\Admin\AppData\Local\Temp\Eve\eve.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\gameux.dll,GameUXShim {d21a32e7-afb2-4ab0-93f0-467d4365cc4c};C:\Users\Admin\AppData\Local\Temp\Eve\eve.exe;27722⤵
- Blocklisted process makes network request
- Modifies registry class
PID:2864
-
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2676
-