Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21-07-2024 22:26
Static task
static1
Behavioral task
behavioral1
Sample
crack/crack.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
crack/crack.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
ecmerge-1.2.34.win32.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
ecmerge-1.2.34.win32.exe
Resource
win10v2004-20240709-en
General
-
Target
ecmerge-1.2.34.win32.exe
-
Size
3.9MB
-
MD5
a5cd7a73982e0dfbd2c99cbb0b6aa2c4
-
SHA1
fb695b7c0f39944a4b1e5d60265ba5ad6b138869
-
SHA256
f49fe28609b59fa318c8da59f2d14f6bd502dcdbe4e2527a89f4b062ad14fedd
-
SHA512
07fd979dd540836bd406202c3cc4086931dcb8963c6a78d485015607af4c195557f25f49066292e992642c124a6ada09ea48f9988e51c9ec9fccc0b9c4529dbb
-
SSDEEP
98304:UdqwuwE9xPulysV/xoLva9SIEUi+SUfvC2YG6uLpvcarWTrY6:cVSUMsYLvayaaylLSaQc6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4920 is-Q584P.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 960 wrote to memory of 4920 960 ecmerge-1.2.34.win32.exe 84 PID 960 wrote to memory of 4920 960 ecmerge-1.2.34.win32.exe 84 PID 960 wrote to memory of 4920 960 ecmerge-1.2.34.win32.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\ecmerge-1.2.34.win32.exe"C:\Users\Admin\AppData\Local\Temp\ecmerge-1.2.34.win32.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\is-O2LCT.tmp\is-Q584P.tmp"C:\Users\Admin\AppData\Local\Temp\is-O2LCT.tmp\is-Q584P.tmp" /SL4 $801EE "C:\Users\Admin\AppData\Local\Temp\ecmerge-1.2.34.win32.exe" 3843776 624642⤵
- Executes dropped EXE
PID:4920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
653KB
MD5e037eb045e554e3fe42d4f7273adc1f9
SHA1447ba7cebf16ca115fa25441c859709c2d907f77
SHA25627a3cdeebe6be2a11af39986119c05e00b4c8e7773989db7c9f9e4439d5b77b3
SHA512c0b3d9cbfe29128e9c8ecd89a103f88e179b5bf8b16edf664470371041c7316fc834d2193af08e829e6945482816635ec989336f1d07e2c2ba1e80cfc1baefa4