Analysis
-
max time kernel
236s -
max time network
240s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 12:16
Static task
static1
Behavioral task
behavioral1
Sample
Mocq Epic.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
Mocq Epic.exe
Resource
win10v2004-20240508-en
Errors
General
-
Target
Mocq Epic.exe
-
Size
306KB
-
MD5
fa26fae9f733a63cfcdf6fcc3127bb84
-
SHA1
273e9e1928f10e1bbba028bd52ca21304a96f613
-
SHA256
0ffdb148ab9c816bf4a643a727e02640878e2c98d4ff2b059e1bb7c3a9dcb48a
-
SHA512
148d035f0eb05e5f5417ca92a0d7d136e3ad84f58971547757b058fcc7f948a77a6b6666818e5ab093106341688719e19385a5e0749798b8970df8af1be12f32
-
SSDEEP
6144:mKuAN92+b1/2C5WxGojEydZ9CjuRDi2AyDf8QjT/LPK8/p+upNnVW4XyS3A8:juANX1eCPojEy79CjEDi2AyDf8QjDLPZ
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
Processes:
LogonUI.exedescription ioc process File created C:\Windows\rescache\_merged\2229298842\2409923810.pri LogonUI.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Modifies data under HKEY_USERS 15 IoCs
Processes:
LogonUI.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "95" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
taskmgr.exepid process 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
AUDIODG.EXEtaskmgr.exedescription pid process Token: 33 1796 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1796 AUDIODG.EXE Token: SeDebugPrivilege 1768 taskmgr.exe Token: SeSystemProfilePrivilege 1768 taskmgr.exe Token: SeCreateGlobalPrivilege 1768 taskmgr.exe Token: 33 1768 taskmgr.exe Token: SeIncBasePriorityPrivilege 1768 taskmgr.exe -
Suspicious use of FindShellTrayWindow 50 IoCs
Processes:
taskmgr.exepid process 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe -
Suspicious use of SendNotifyMessage 50 IoCs
Processes:
taskmgr.exepid process 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe 1768 taskmgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
LogonUI.exepid process 4688 LogonUI.exe 4688 LogonUI.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Mocq Epic.exe"C:\Users\Admin\AppData\Local\Temp\Mocq Epic.exe"1⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2fc 0x3901⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3903055 /state1:0x41c64e6d1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1768-20-0x0000021ADDDC0000-0x0000021ADDDC1000-memory.dmpFilesize
4KB
-
memory/1768-16-0x0000021ADDDC0000-0x0000021ADDDC1000-memory.dmpFilesize
4KB
-
memory/1768-8-0x0000021ADDDC0000-0x0000021ADDDC1000-memory.dmpFilesize
4KB
-
memory/1768-10-0x0000021ADDDC0000-0x0000021ADDDC1000-memory.dmpFilesize
4KB
-
memory/1768-14-0x0000021ADDDC0000-0x0000021ADDDC1000-memory.dmpFilesize
4KB
-
memory/1768-15-0x0000021ADDDC0000-0x0000021ADDDC1000-memory.dmpFilesize
4KB
-
memory/1768-17-0x0000021ADDDC0000-0x0000021ADDDC1000-memory.dmpFilesize
4KB
-
memory/1768-18-0x0000021ADDDC0000-0x0000021ADDDC1000-memory.dmpFilesize
4KB
-
memory/1768-19-0x0000021ADDDC0000-0x0000021ADDDC1000-memory.dmpFilesize
4KB
-
memory/1768-9-0x0000021ADDDC0000-0x0000021ADDDC1000-memory.dmpFilesize
4KB
-
memory/2236-5-0x00007FFCFA0A3000-0x00007FFCFA0A5000-memory.dmpFilesize
8KB
-
memory/2236-21-0x00007FFCFA0A0000-0x00007FFCFAB61000-memory.dmpFilesize
10.8MB
-
memory/2236-0-0x00007FFCFA0A3000-0x00007FFCFA0A5000-memory.dmpFilesize
8KB
-
memory/2236-2-0x0000000000F10000-0x0000000000F24000-memory.dmpFilesize
80KB
-
memory/2236-7-0x00007FFCFA0A0000-0x00007FFCFAB61000-memory.dmpFilesize
10.8MB
-
memory/2236-6-0x00007FFCFA0A0000-0x00007FFCFAB61000-memory.dmpFilesize
10.8MB
-
memory/2236-1-0x0000000000710000-0x0000000000764000-memory.dmpFilesize
336KB
-
memory/2236-4-0x00007FFCFA0A0000-0x00007FFCFAB61000-memory.dmpFilesize
10.8MB
-
memory/2236-3-0x00007FFCFA0A0000-0x00007FFCFAB61000-memory.dmpFilesize
10.8MB