Analysis
-
max time kernel
148s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 04:54
Static task
static1
Behavioral task
behavioral1
Sample
ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe
Resource
win10v2004-20240508-en
General
-
Target
ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe
-
Size
8.6MB
-
MD5
105a2ba8b5d9979c2c9a899e689af728
-
SHA1
866877c474881caba02cd309db1af1846028f702
-
SHA256
ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a
-
SHA512
d6e97e7cf7fb68c7ac5a0e27a14effc7af4ed0279723b9f4d1eaee086e7526774f7915ae887d687bd5a36eef3884ee5bff2756dc6b40562c2afb3b2f0a95cffd
-
SSDEEP
196608:7AZ/zoE95QUyL0L6p9hdYWZbi8aH0qTos8ouEXTCw1FH7J8Z:7AZkE9G46PhdYou8iBT41EX+w1FHuZ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3980 ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe File opened (read-only) \??\Z: ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe File opened (read-only) \??\J: ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe File opened (read-only) \??\M: ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe File opened (read-only) \??\U: ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe File opened (read-only) \??\W: ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe File opened (read-only) \??\I: ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe File opened (read-only) \??\O: ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe File opened (read-only) \??\P: ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe File opened (read-only) \??\R: ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe File opened (read-only) \??\A: ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe File opened (read-only) \??\B: ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe File opened (read-only) \??\E: ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe File opened (read-only) \??\G: ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe File opened (read-only) \??\T: ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe File opened (read-only) \??\S: ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe File opened (read-only) \??\H: ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe File opened (read-only) \??\K: ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe File opened (read-only) \??\L: ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe File opened (read-only) \??\Q: ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe File opened (read-only) \??\N: ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe File opened (read-only) \??\V: ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe File opened (read-only) \??\Y: ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1316 ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe 1316 ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe 1316 ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe 1316 ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe 1316 ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe 3980 ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe 3980 ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe 3980 ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe 3980 ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe 3980 ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1316 wrote to memory of 3980 1316 ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe 84 PID 1316 wrote to memory of 3980 1316 ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe 84 PID 1316 wrote to memory of 3980 1316 ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe"C:\Users\Admin\AppData\Local\Temp\ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe"1⤵
- Enumerates connected drives
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\ÈÈѪ´«Ææ\ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exeC:\ÈÈѪ´«Ææ\ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12B
MD56837724c314d40567b48f77e84c4a1fe
SHA1fe40871082304b3876ee4aee6b3a6b67d9ad7e13
SHA2568feeb29152b7a1ff207f5db2e48a383f118faed4f5e4cf3f7105122f14b3093f
SHA51269009beb3b26a43f4c5d87497b7910bec5124fcaef5933b32290cd2139527dc4a892f85082ce2f5f5cb4f03ccc7048746f9b67034c66986bde0746fc740a9a81
-
Filesize
8.6MB
MD5105a2ba8b5d9979c2c9a899e689af728
SHA1866877c474881caba02cd309db1af1846028f702
SHA256ee0230b62df2e4b6ec5e3528620b7ceee6735fed15387d21c5f8feaad122835a
SHA512d6e97e7cf7fb68c7ac5a0e27a14effc7af4ed0279723b9f4d1eaee086e7526774f7915ae887d687bd5a36eef3884ee5bff2756dc6b40562c2afb3b2f0a95cffd