Analysis

  • max time kernel
    140s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21/07/2024, 22:26 UTC

General

  • Target

    ecmerge-1.2.34.win32.exe

  • Size

    3.9MB

  • MD5

    a5cd7a73982e0dfbd2c99cbb0b6aa2c4

  • SHA1

    fb695b7c0f39944a4b1e5d60265ba5ad6b138869

  • SHA256

    f49fe28609b59fa318c8da59f2d14f6bd502dcdbe4e2527a89f4b062ad14fedd

  • SHA512

    07fd979dd540836bd406202c3cc4086931dcb8963c6a78d485015607af4c195557f25f49066292e992642c124a6ada09ea48f9988e51c9ec9fccc0b9c4529dbb

  • SSDEEP

    98304:UdqwuwE9xPulysV/xoLva9SIEUi+SUfvC2YG6uLpvcarWTrY6:cVSUMsYLvayaaylLSaQc6

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ecmerge-1.2.34.win32.exe
    "C:\Users\Admin\AppData\Local\Temp\ecmerge-1.2.34.win32.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2968
    • C:\Users\Admin\AppData\Local\Temp\is-7ESNF.tmp\is-2QQPQ.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-7ESNF.tmp\is-2QQPQ.tmp" /SL4 $400EE "C:\Users\Admin\AppData\Local\Temp\ecmerge-1.2.34.win32.exe" 3843776 62464
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\is-3VCMK.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-7ESNF.tmp\is-2QQPQ.tmp

    Filesize

    653KB

    MD5

    e037eb045e554e3fe42d4f7273adc1f9

    SHA1

    447ba7cebf16ca115fa25441c859709c2d907f77

    SHA256

    27a3cdeebe6be2a11af39986119c05e00b4c8e7773989db7c9f9e4439d5b77b3

    SHA512

    c0b3d9cbfe29128e9c8ecd89a103f88e179b5bf8b16edf664470371041c7316fc834d2193af08e829e6945482816635ec989336f1d07e2c2ba1e80cfc1baefa4

  • memory/2536-16-0x0000000000400000-0x00000000004D1000-memory.dmp

    Filesize

    836KB

  • memory/2968-0-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2968-2-0x0000000000401000-0x000000000040A000-memory.dmp

    Filesize

    36KB

  • memory/2968-15-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.