Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
25-06-2024 17:40
Behavioral task
behavioral1
Sample
b07419c82df94b0a3ce72e3d801c19fcb6ed2d728627ef6429e1bcd936ee912e.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b07419c82df94b0a3ce72e3d801c19fcb6ed2d728627ef6429e1bcd936ee912e.exe
Resource
win10v2004-20240611-en
General
-
Target
b07419c82df94b0a3ce72e3d801c19fcb6ed2d728627ef6429e1bcd936ee912e.exe
-
Size
6.0MB
-
MD5
49f6055bf9a488341080d9b7ececaaf4
-
SHA1
def538068ff27745436c8bd03f9538b4eb7af8de
-
SHA256
b07419c82df94b0a3ce72e3d801c19fcb6ed2d728627ef6429e1bcd936ee912e
-
SHA512
41dda2b84cfc8682549584ff3811dbfeac6dfa11a724c5e66e7041df681292a297874c69c88bb03f0536bf2b83c061b507c47219b4ff1aff9c923c1f0c688cea
-
SSDEEP
98304:vPQmMyyu0JQdcVf8zcBl0qqsPOb3hSNVzArOSqeDalc6d1:xQc9BDald
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
b07419c82df94b0a3ce72e3d801c19fcb6ed2d728627ef6429e1bcd936ee912e.exepid process 1900 b07419c82df94b0a3ce72e3d801c19fcb6ed2d728627ef6429e1bcd936ee912e.exe -
Processes:
resource yara_rule behavioral2/memory/1900-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-48-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-46-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-24-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-22-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-20-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-10-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-8-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1900-93-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
b07419c82df94b0a3ce72e3d801c19fcb6ed2d728627ef6429e1bcd936ee912e.exepid process 1900 b07419c82df94b0a3ce72e3d801c19fcb6ed2d728627ef6429e1bcd936ee912e.exe 1900 b07419c82df94b0a3ce72e3d801c19fcb6ed2d728627ef6429e1bcd936ee912e.exe 1900 b07419c82df94b0a3ce72e3d801c19fcb6ed2d728627ef6429e1bcd936ee912e.exe 1900 b07419c82df94b0a3ce72e3d801c19fcb6ed2d728627ef6429e1bcd936ee912e.exe 1900 b07419c82df94b0a3ce72e3d801c19fcb6ed2d728627ef6429e1bcd936ee912e.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\E2EECore.2.7.2.dllFilesize
8.4MB
MD58b6c94bbdbfb213e94a5dcb4fac28ce3
SHA1b56102ca4f03556f387f8b30e2b404efabe0cb65
SHA256982a177924762f270b36fe34c7d6847392b48ae53151dc2011078dceef487a53
SHA5129d6d63b5d8cf7a978d7e91126d7a343c2f7acd00022da9d692f63e50835fdd84a59a93328564f10622f2b1f6adfd7febdd98b8ddb294d0754ed45cc9c165d25a
-
C:\Users\Admin\AppData\Local\Temp\config.confFilesize
21B
MD5dbc4ff7efa369d11d6c06b0f6c92f0ee
SHA1d35f79b9ce654c0256cddd19fb163e05a673b13e
SHA25646244cbfa60d43d029ebaa272b7934db3363770d706c62a7d55dfe2df9a1812e
SHA51228fc1ef42419b00cebb3374610d54e24f5de063f65d63d861dfec14162ef8f47781fb7fd75f0e806e655bcd8e7d38b426ded70956febab9e3bd1203a1f22ebc8
-
C:\Users\Admin\AppData\Local\Temp\config.confFilesize
98B
MD5989d26cd53c6be5a68809da262622abe
SHA1b22e3dd20680873fa85c33284209b8066e30a13d
SHA256d7788943c4cd8f9149604d4c9e8140dfbba68b6a90e65aa6021f68f9e42bb76b
SHA512a8bdd4ae1403989ce5a1e8c38c20b24c9d6687d14dc7a5f2ec7c6429c28782000e60de69657851addad80edb0918396871d263c30155454bef4ad00923dd6a56
-
C:\Users\Admin\AppData\Local\Temp\config.confFilesize
120B
MD5f8d28bef6e2dbe455c60c379527daef3
SHA1f8b64e7228faea1c1c630a08a78f0fd48c943c04
SHA256e8beb91f6ef31a1563c8a6f6d7ae1a33f931928bf8c9c05f709dca57ecd86e3e
SHA512f8935ca6c496cd4cc649c0ad01db564dd11bffc1b4be90828f49209a593dcfd7ec8b60e8cd2df168bfe7fd69a459983ec88880f92d502681ef9a4871f65c7509
-
memory/1900-32-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1900-22-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1900-48-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1900-46-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1900-44-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1900-42-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1900-40-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1900-38-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1900-36-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1900-34-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1900-27-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1900-30-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1900-24-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1900-49-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1900-20-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1900-19-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1900-16-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1900-14-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1900-10-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1900-8-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1900-7-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1900-12-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1900-28-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1900-6-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1900-5-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1900-93-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB