Malware Analysis Report

2024-07-28 11:06

Sample ID 240625-v81kcatdjh
Target b07419c82df94b0a3ce72e3d801c19fcb6ed2d728627ef6429e1bcd936ee912e
SHA256 b07419c82df94b0a3ce72e3d801c19fcb6ed2d728627ef6429e1bcd936ee912e
Tags
oss_ak upx
score
9/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
9/10

SHA256

b07419c82df94b0a3ce72e3d801c19fcb6ed2d728627ef6429e1bcd936ee912e

Threat Level: Likely malicious

The file b07419c82df94b0a3ce72e3d801c19fcb6ed2d728627ef6429e1bcd936ee912e was found to be: Likely malicious.

Malicious Activity Summary

oss_ak upx

detect oss ak

Loads dropped DLL

UPX packed file

Unsigned PE

Suspicious use of SetWindowsHookEx

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-25 17:40

Signatures

detect oss ak

oss_ak
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-25 17:40

Reported

2024-06-25 17:43

Platform

win7-20240611-en

Max time kernel

120s

Max time network

125s

Command Line

"C:\Users\Admin\AppData\Local\Temp\b07419c82df94b0a3ce72e3d801c19fcb6ed2d728627ef6429e1bcd936ee912e.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\b07419c82df94b0a3ce72e3d801c19fcb6ed2d728627ef6429e1bcd936ee912e.exe

"C:\Users\Admin\AppData\Local\Temp\b07419c82df94b0a3ce72e3d801c19fcb6ed2d728627ef6429e1bcd936ee912e.exe"

Network

N/A

Files

\Users\Admin\AppData\Local\Temp\E2EECore.2.7.2.dll

MD5 8b6c94bbdbfb213e94a5dcb4fac28ce3
SHA1 b56102ca4f03556f387f8b30e2b404efabe0cb65
SHA256 982a177924762f270b36fe34c7d6847392b48ae53151dc2011078dceef487a53
SHA512 9d6d63b5d8cf7a978d7e91126d7a343c2f7acd00022da9d692f63e50835fdd84a59a93328564f10622f2b1f6adfd7febdd98b8ddb294d0754ed45cc9c165d25a

memory/2072-4-0x0000000010000000-0x000000001003E000-memory.dmp

memory/2072-5-0x0000000010000000-0x000000001003E000-memory.dmp

memory/2072-17-0x0000000010000000-0x000000001003E000-memory.dmp

memory/2072-35-0x0000000010000000-0x000000001003E000-memory.dmp

memory/2072-7-0x0000000010000000-0x000000001003E000-memory.dmp

memory/2072-33-0x0000000010000000-0x000000001003E000-memory.dmp

memory/2072-48-0x0000000010000000-0x000000001003E000-memory.dmp

memory/2072-45-0x0000000010000000-0x000000001003E000-memory.dmp

memory/2072-43-0x0000000010000000-0x000000001003E000-memory.dmp

memory/2072-42-0x0000000010000000-0x000000001003E000-memory.dmp

memory/2072-39-0x0000000010000000-0x000000001003E000-memory.dmp

memory/2072-37-0x0000000010000000-0x000000001003E000-memory.dmp

memory/2072-31-0x0000000010000000-0x000000001003E000-memory.dmp

memory/2072-29-0x0000000010000000-0x000000001003E000-memory.dmp

memory/2072-27-0x0000000010000000-0x000000001003E000-memory.dmp

memory/2072-25-0x0000000010000000-0x000000001003E000-memory.dmp

memory/2072-23-0x0000000010000000-0x000000001003E000-memory.dmp

memory/2072-21-0x0000000010000000-0x000000001003E000-memory.dmp

memory/2072-19-0x0000000010000000-0x000000001003E000-memory.dmp

memory/2072-15-0x0000000010000000-0x000000001003E000-memory.dmp

memory/2072-13-0x0000000010000000-0x000000001003E000-memory.dmp

memory/2072-12-0x0000000010000000-0x000000001003E000-memory.dmp

memory/2072-9-0x0000000010000000-0x000000001003E000-memory.dmp

memory/2072-6-0x0000000010000000-0x000000001003E000-memory.dmp

memory/2072-50-0x0000000010000000-0x000000001003E000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-25 17:40

Reported

2024-06-25 17:42

Platform

win10v2004-20240611-en

Max time kernel

149s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\b07419c82df94b0a3ce72e3d801c19fcb6ed2d728627ef6429e1bcd936ee912e.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\b07419c82df94b0a3ce72e3d801c19fcb6ed2d728627ef6429e1bcd936ee912e.exe

"C:\Users\Admin\AppData\Local\Temp\b07419c82df94b0a3ce72e3d801c19fcb6ed2d728627ef6429e1bcd936ee912e.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 68.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 80.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 82.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 udp

Files

C:\Users\Admin\AppData\Local\Temp\E2EECore.2.7.2.dll

MD5 8b6c94bbdbfb213e94a5dcb4fac28ce3
SHA1 b56102ca4f03556f387f8b30e2b404efabe0cb65
SHA256 982a177924762f270b36fe34c7d6847392b48ae53151dc2011078dceef487a53
SHA512 9d6d63b5d8cf7a978d7e91126d7a343c2f7acd00022da9d692f63e50835fdd84a59a93328564f10622f2b1f6adfd7febdd98b8ddb294d0754ed45cc9c165d25a

memory/1900-5-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1900-6-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1900-28-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1900-27-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1900-49-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1900-48-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1900-46-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1900-44-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1900-42-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1900-40-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1900-38-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1900-36-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1900-34-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1900-32-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1900-30-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1900-24-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1900-22-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1900-20-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1900-19-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1900-16-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1900-14-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1900-10-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1900-8-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1900-7-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1900-12-0x0000000010000000-0x000000001003E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\config.conf

MD5 dbc4ff7efa369d11d6c06b0f6c92f0ee
SHA1 d35f79b9ce654c0256cddd19fb163e05a673b13e
SHA256 46244cbfa60d43d029ebaa272b7934db3363770d706c62a7d55dfe2df9a1812e
SHA512 28fc1ef42419b00cebb3374610d54e24f5de063f65d63d861dfec14162ef8f47781fb7fd75f0e806e655bcd8e7d38b426ded70956febab9e3bd1203a1f22ebc8

C:\Users\Admin\AppData\Local\Temp\config.conf

MD5 989d26cd53c6be5a68809da262622abe
SHA1 b22e3dd20680873fa85c33284209b8066e30a13d
SHA256 d7788943c4cd8f9149604d4c9e8140dfbba68b6a90e65aa6021f68f9e42bb76b
SHA512 a8bdd4ae1403989ce5a1e8c38c20b24c9d6687d14dc7a5f2ec7c6429c28782000e60de69657851addad80edb0918396871d263c30155454bef4ad00923dd6a56

C:\Users\Admin\AppData\Local\Temp\config.conf

MD5 f8d28bef6e2dbe455c60c379527daef3
SHA1 f8b64e7228faea1c1c630a08a78f0fd48c943c04
SHA256 e8beb91f6ef31a1563c8a6f6d7ae1a33f931928bf8c9c05f709dca57ecd86e3e
SHA512 f8935ca6c496cd4cc649c0ad01db564dd11bffc1b4be90828f49209a593dcfd7ec8b60e8cd2df168bfe7fd69a459983ec88880f92d502681ef9a4871f65c7509

memory/1900-93-0x0000000010000000-0x000000001003E000-memory.dmp