Analysis
-
max time kernel
121s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 19:05
Static task
static1
Behavioral task
behavioral1
Sample
3b9372d3e20da942dc2d45c669d2bb574581b6b79289fcccd6a98fc3b15f21f0.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3b9372d3e20da942dc2d45c669d2bb574581b6b79289fcccd6a98fc3b15f21f0.exe
Resource
win10v2004-20240709-en
General
-
Target
3b9372d3e20da942dc2d45c669d2bb574581b6b79289fcccd6a98fc3b15f21f0.exe
-
Size
716KB
-
MD5
1f76dc76b39394dd7b274605f9734673
-
SHA1
5c372fcf1750cba8d55461cca9db95d28abb2489
-
SHA256
3b9372d3e20da942dc2d45c669d2bb574581b6b79289fcccd6a98fc3b15f21f0
-
SHA512
ef32559310fadaa2fae558ce16be903382330bacccee7c6561cedf09a28f1986197ae4ac5d0dcf4b95dd1e01675ca40e1858c5b3773cb6dd14d04112d58d03bd
-
SSDEEP
6144:8sJTwyyCznLTllQ74YQot39HTidBTaKHDoehYpgEHNQSM:8yTrvNaFGiwYe9t
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2716 ooeaya.exe 2696 ooeaya.exe -
Creates a Windows Service
-
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\ooeaya.exe 3b9372d3e20da942dc2d45c669d2bb574581b6b79289fcccd6a98fc3b15f21f0.exe File created C:\Windows\ooeaya.exe 3b9372d3e20da942dc2d45c669d2bb574581b6b79289fcccd6a98fc3b15f21f0.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ooeaya.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ooeaya.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie ooeaya.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum ooeaya.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum\Version = "7" ooeaya.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum ooeaya.exe Key created \REGISTRY\USER\.DEFAULT\Software ooeaya.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft ooeaya.exe -
Suspicious behavior: EnumeratesProcesses 51 IoCs
pid Process 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe 2696 ooeaya.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2764 3b9372d3e20da942dc2d45c669d2bb574581b6b79289fcccd6a98fc3b15f21f0.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2764 3b9372d3e20da942dc2d45c669d2bb574581b6b79289fcccd6a98fc3b15f21f0.exe 2716 ooeaya.exe 2696 ooeaya.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2696 2716 ooeaya.exe 31 PID 2716 wrote to memory of 2696 2716 ooeaya.exe 31 PID 2716 wrote to memory of 2696 2716 ooeaya.exe 31 PID 2716 wrote to memory of 2696 2716 ooeaya.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b9372d3e20da942dc2d45c669d2bb574581b6b79289fcccd6a98fc3b15f21f0.exe"C:\Users\Admin\AppData\Local\Temp\3b9372d3e20da942dc2d45c669d2bb574581b6b79289fcccd6a98fc3b15f21f0.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:2764
-
C:\Windows\ooeaya.exeC:\Windows\ooeaya.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\ooeaya.exeC:\Windows\ooeaya.exe Win72⤵
- Executes dropped EXE
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
716KB
MD51f76dc76b39394dd7b274605f9734673
SHA15c372fcf1750cba8d55461cca9db95d28abb2489
SHA2563b9372d3e20da942dc2d45c669d2bb574581b6b79289fcccd6a98fc3b15f21f0
SHA512ef32559310fadaa2fae558ce16be903382330bacccee7c6561cedf09a28f1986197ae4ac5d0dcf4b95dd1e01675ca40e1858c5b3773cb6dd14d04112d58d03bd