Analysis

  • max time kernel
    29s
  • max time network
    25s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    02/06/2024, 14:24

General

  • Target

    equil/Equil.exe

  • Size

    315KB

  • MD5

    1072ebb6213cc03ac9e95ba8d9e64e0d

  • SHA1

    9f55afff7552396fb06ef40b20a0758a1696e24a

  • SHA256

    9bb70607d34ec9888aeda348c1dfa7984d5365586115e0fa6bd0fbf221f6d48b

  • SHA512

    6cdc9c53ae2d5195a94338e470ad670dbbc0f65254bc4ab16c21bf4d15ff94c6760de807341ade5c651f1c87a429fea80aab57f72afa5d3ab285102385b72001

  • SSDEEP

    3072:WUmTM6EWxDNq4h1SsiupSnq02qRwffb+BqFoDmE70G00QRy1mZ6MXHsFC6fzBjDb:MEYtjSsiupKwfohDRsXNVK

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 5 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 31 IoCs
  • Suspicious use of SendNotifyMessage 63 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\equil\Equil.exe
    "C:\Users\Admin\AppData\Local\Temp\equil\Equil.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1656
    • C:\Windows\System32\wbem\WMIC.exe
      "C:\Windows\System32\wbem\WMIC.exe" process where name='explorer.exe' delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2584
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe" àâæçèêëïîôœ€àâæàâæê
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2468
    • C:\Windows\System32\dfrgui.exe
      "C:\Windows\System32\dfrgui.exe"
      2⤵
        PID:708
      • C:\Windows\System32\tabcal.exe
        "C:\Windows\System32\tabcal.exe" /4
        2⤵
          PID:2008
        • C:\Windows\System32\mstsc.exe
          "C:\Windows\System32\mstsc.exe" -v Iæêgæêd_æêîæêî_alloca
          2⤵
          • Enumerates connected drives
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious use of SetWindowsHookEx
          PID:580
        • C:\Program Files\Common Files\Microsoft Shared\ink\mip.exe
          "C:\Program Files\Common Files\Microsoft Shared\ink\mip.exe"
          2⤵
            PID:1748
          • C:\Program Files\Common Files\Microsoft Shared\ink\mip.exe
            "C:\Program Files\Common Files\Microsoft Shared\ink\mip.exe"
            2⤵
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2660
            • C:\Windows\SYSTEM32\WISPTIS.EXE
              "C:\Windows\SYSTEM32\WISPTIS.EXE" /ManualLaunch;
              3⤵
              • Suspicious use of SetWindowsHookEx
              PID:1484
          • C:\Windows\System32\msinfo32.exe
            "C:\Windows\System32\msinfo32.exe" <
            2⤵
              PID:2472
            • C:\Windows\System32\msiexec.exe
              "C:\Windows\System32\msiexec.exe" <
              2⤵
                PID:1220
              • C:\Windows\System32\msra.exe
                "C:\Windows\System32\msra.exe" <
                2⤵
                  PID:1244
                • C:\Windows\System32\mspaint.exe
                  "C:\Windows\System32\mspaint.exe" <
                  2⤵
                  • Drops file in Windows directory
                  • Suspicious use of SetWindowsHookEx
                  PID:2448
                • C:\Windows\System32\wusa.exe
                  "C:\Windows\System32\wusa.exe" <
                  2⤵
                  • Drops file in Windows directory
                  PID:2608
                • C:\Windows\System32\recdisc.exe
                  "C:\Windows\System32\recdisc.exe" <
                  2⤵
                  • Drops file in Windows directory
                  PID:1452
              • C:\Windows\explorer.exe
                explorer.exe
                1⤵
                • Modifies Installed Components in the registry
                • Modifies registry class
                • Suspicious behavior: GetForegroundWindowSpam
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of SetWindowsHookEx
                PID:1352

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/1352-8-0x000000013F3D0000-0x000000013F43A000-memory.dmp

                Filesize

                424KB

              • memory/1656-0-0x000000013F3D0000-0x000000013F43A000-memory.dmp

                Filesize

                424KB

              • memory/1656-1-0x0000000003900000-0x0000000003901000-memory.dmp

                Filesize

                4KB

              • memory/1656-10-0x0000000003900000-0x0000000003901000-memory.dmp

                Filesize

                4KB

              • memory/1656-9-0x000000013F3D0000-0x000000013F43A000-memory.dmp

                Filesize

                424KB

              • memory/2448-13-0x000007FEE8C30000-0x000007FEE8C7C000-memory.dmp

                Filesize

                304KB

              • memory/2468-6-0x0000000002520000-0x0000000002542000-memory.dmp

                Filesize

                136KB

              • memory/2468-5-0x0000000002520000-0x0000000002542000-memory.dmp

                Filesize

                136KB

              • memory/2468-4-0x000007FEF52D0000-0x000007FEF5C6D000-memory.dmp

                Filesize

                9.6MB

              • memory/2468-11-0x000007FEF558E000-0x000007FEF558F000-memory.dmp

                Filesize

                4KB

              • memory/2468-3-0x000007FEF52D0000-0x000007FEF5C6D000-memory.dmp

                Filesize

                9.6MB

              • memory/2468-12-0x000007FEF52D0000-0x000007FEF5C6D000-memory.dmp

                Filesize

                9.6MB

              • memory/2468-2-0x000007FEF558E000-0x000007FEF558F000-memory.dmp

                Filesize

                4KB