Analysis

  • max time kernel
    141s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    10-05-2024 12:56

General

  • Target

    eXeScope.exe

  • Size

    545KB

  • MD5

    914466dbe5a5e9b4fb7f7e9b8249b2d3

  • SHA1

    44e9656f30bf43fb7bd2d0ab500461753c542067

  • SHA256

    b45fe721d44ee96d10c5437bd82ba95b33129b17da313b0ce26df1911aed5476

  • SHA512

    36cd2dae5da618f0cb453109447596e93fad0baacd95d378e9c478d7fdf04b3a7194325d1ef774aece1c882f8f232555b6172a3249adf47cbf9def58ca3533a7

  • SSDEEP

    12288:1srnQKTs4RHEWg4YrA1NakLtVTs34Nj3cJdWlX8sj/wxorMWcG4iN2gCu:1sTjQ4RHzg4Yr+tBskj3IdWusseQWfNr

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eXeScope.exe
    "C:\Users\Admin\AppData\Local\Temp\eXeScope.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3000
    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\eXeScope.exe
      "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\eXeScope.exe"
      2⤵
      • Executes dropped EXE
      PID:1208

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\eXeScope.ini

    Filesize

    76B

    MD5

    ec957441812eb3664959c2368937018d

    SHA1

    810ad9eb0f6a9e207044a44b41f0aaf660d07806

    SHA256

    dc812383374e0d000809e98549e23f88b2ebd451a9e58b16155e8bb479139540

    SHA512

    c85fdef629516e3f5044a5827e23a71c753ae73409882f967bbf88a737cafd50ad6017ba93e65acf90f43ce8dea72939ff579403f30c7a974d4f374403844167

  • \Users\Admin\AppData\Local\Temp\7ZipSfx.000\eXeScope.exe

    Filesize

    971KB

    MD5

    6fdc6e2ba752c64a5b2a4f24b5d2816b

    SHA1

    1481f12d169c1a5bf574f7b2fc46980431fae6fe

    SHA256

    0df9c3ba9669e9d04d6085ccd165db91eea4661a5612284e22a7774df0adeeea

    SHA512

    e7f385df5f81f466273a92d921dfda6c476deef1f0b4832a99766c4c3c3071e5b9beabe330be4e34869118ed95838018c18c768ad342612bc0a6e589638c4967

  • memory/1208-18-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/1208-20-0x0000000000400000-0x00000000004FA000-memory.dmp

    Filesize

    1000KB

  • memory/1208-22-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB