Analysis

  • max time kernel
    140s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21/07/2024, 22:26

General

  • Target

    ecmerge-1.2.34.win32.exe

  • Size

    3.9MB

  • MD5

    a5cd7a73982e0dfbd2c99cbb0b6aa2c4

  • SHA1

    fb695b7c0f39944a4b1e5d60265ba5ad6b138869

  • SHA256

    f49fe28609b59fa318c8da59f2d14f6bd502dcdbe4e2527a89f4b062ad14fedd

  • SHA512

    07fd979dd540836bd406202c3cc4086931dcb8963c6a78d485015607af4c195557f25f49066292e992642c124a6ada09ea48f9988e51c9ec9fccc0b9c4529dbb

  • SSDEEP

    98304:UdqwuwE9xPulysV/xoLva9SIEUi+SUfvC2YG6uLpvcarWTrY6:cVSUMsYLvayaaylLSaQc6

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ecmerge-1.2.34.win32.exe
    "C:\Users\Admin\AppData\Local\Temp\ecmerge-1.2.34.win32.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2968
    • C:\Users\Admin\AppData\Local\Temp\is-7ESNF.tmp\is-2QQPQ.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-7ESNF.tmp\is-2QQPQ.tmp" /SL4 $400EE "C:\Users\Admin\AppData\Local\Temp\ecmerge-1.2.34.win32.exe" 3843776 62464
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2536

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\is-3VCMK.tmp\_isetup\_shfoldr.dll

          Filesize

          22KB

          MD5

          92dc6ef532fbb4a5c3201469a5b5eb63

          SHA1

          3e89ff837147c16b4e41c30d6c796374e0b8e62c

          SHA256

          9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

          SHA512

          9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

        • \Users\Admin\AppData\Local\Temp\is-7ESNF.tmp\is-2QQPQ.tmp

          Filesize

          653KB

          MD5

          e037eb045e554e3fe42d4f7273adc1f9

          SHA1

          447ba7cebf16ca115fa25441c859709c2d907f77

          SHA256

          27a3cdeebe6be2a11af39986119c05e00b4c8e7773989db7c9f9e4439d5b77b3

          SHA512

          c0b3d9cbfe29128e9c8ecd89a103f88e179b5bf8b16edf664470371041c7316fc834d2193af08e829e6945482816635ec989336f1d07e2c2ba1e80cfc1baefa4

        • memory/2536-16-0x0000000000400000-0x00000000004D1000-memory.dmp

          Filesize

          836KB

        • memory/2968-0-0x0000000000400000-0x0000000000415000-memory.dmp

          Filesize

          84KB

        • memory/2968-2-0x0000000000401000-0x000000000040A000-memory.dmp

          Filesize

          36KB

        • memory/2968-15-0x0000000000400000-0x0000000000415000-memory.dmp

          Filesize

          84KB