Analysis
-
max time kernel
154s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 11:44
Static task
static1
Behavioral task
behavioral1
Sample
Eparch.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Eparch.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240426-en
General
-
Target
Eparch.exe
-
Size
1.3MB
-
MD5
6836de048b7b10e90d5a648a624ac8ab
-
SHA1
b7864d902602cf2899d959a1bf65be93407738c1
-
SHA256
a584a7054b272f94152af1315fac014d5c23cbc9a57f4087fee548e20d3ae31d
-
SHA512
67bd802d6178f31efbf909268d1eb88bea0193dd290c43d93e532335f50ebe4069860b8402b0eff4d9b4b51ad7ce4ee9c3149e201ed3b551e932edfca64d491e
-
SSDEEP
24576:O9Q0lIVTRJfsGJXcaxz5G75P0hy/U77VaaG8uosbrDqa1VHWTcSdmWDxbLn/ohP:oQ0lsRZJcaBY7R0YM77YoOrDX1l2xbLQ
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3176 Eparch.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 57 drive.google.com 59 drive.google.com -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 3008 Eparch.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3176 Eparch.exe 3008 Eparch.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3176 set thread context of 3008 3176 Eparch.exe 101 PID 3008 set thread context of 3296 3008 Eparch.exe 56 -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\konvoluterer\Forsikringsinspektrer.ini Eparch.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\mycelian\sempitern.ini Eparch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3008 Eparch.exe 3008 Eparch.exe 3008 Eparch.exe 3008 Eparch.exe 3008 Eparch.exe 3008 Eparch.exe 3008 Eparch.exe 3008 Eparch.exe 3008 Eparch.exe 3008 Eparch.exe 3008 Eparch.exe 3008 Eparch.exe 3008 Eparch.exe 3008 Eparch.exe 3008 Eparch.exe 3008 Eparch.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3176 Eparch.exe 3008 Eparch.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3176 wrote to memory of 3008 3176 Eparch.exe 101 PID 3176 wrote to memory of 3008 3176 Eparch.exe 101 PID 3176 wrote to memory of 3008 3176 Eparch.exe 101 PID 3176 wrote to memory of 3008 3176 Eparch.exe 101 PID 3176 wrote to memory of 3008 3176 Eparch.exe 101 PID 3296 wrote to memory of 4276 3296 Explorer.EXE 102 PID 3296 wrote to memory of 4276 3296 Explorer.EXE 102 PID 3296 wrote to memory of 4276 3296 Explorer.EXE 102
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Users\Admin\AppData\Local\Temp\Eparch.exe"C:\Users\Admin\AppData\Local\Temp\Eparch.exe"2⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\Eparch.exe"C:\Users\Admin\AppData\Local\Temp\Eparch.exe"3⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3008
-
-
-
C:\Windows\SysWOW64\wevtutil.exe"C:\Windows\SysWOW64\wevtutil.exe"2⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3748 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:81⤵PID:3740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5b8992e497d57001ddf100f9c397fcef5
SHA1e26ddf101a2ec5027975d2909306457c6f61cfbd
SHA25698bcd1dd88642f4dd36a300c76ebb1ddfbbbc5bfc7e3b6d7435dc6d6e030c13b
SHA5128823b1904dccfaf031068102cb1def7958a057f49ff369f0e061f1b4db2090021aa620bb8442a2a6ac9355bb74ee54371dc2599c20dc723755a46ede81533a3c