Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-07-2024 11:57
Static task
static1
Behavioral task
behavioral1
Sample
1E31A6DE957ADB7A23E155EF8E9F80E67DC763443053E0014FBA9E91F4EEBC6F.exe
Resource
win7-20240708-en
General
-
Target
1E31A6DE957ADB7A23E155EF8E9F80E67DC763443053E0014FBA9E91F4EEBC6F.exe
-
Size
240KB
-
MD5
9ad0e9c3ba18150e9bb1176cd3cc5cfb
-
SHA1
ca69a444c9bdb2b80411cd9ba8a3be06a87053c2
-
SHA256
69b22d283fd4a6ce1c9f69f610449b016fdbb7ac1f8c23e199b3c72d7f75c61d
-
SHA512
78af683bfb37d139a1cb3e3050b1a7075443197fec209d376aafdaa0694590de1a9103dd82725649dd4b35d7485e5b7a92f74d59a531ebe06fef513e15f3650b
-
SSDEEP
1536:YzlKjIgWITA+dAGkDEQqrj0OzgFx3wyU0SyvmQm3ZH459VSypXoDzjD7GCq2iW7z:OlKjIbAUFzU0Scm13259VSypXAv/GCH
Malware Config
Extracted
systembc
31.44.185.6:4001
31.44.185.11:4001
Signatures
-
Processes:
resource yara_rule behavioral1/files/0x000a0000000122f6-8.dat aspack_v212_v242 -
Executes dropped EXE 3 IoCs
Processes:
CaEsb.exeunhsmqk.exeCaEsb.exepid Process 1720 CaEsb.exe 2680 unhsmqk.exe 1740 CaEsb.exe -
Loads dropped DLL 4 IoCs
Processes:
1E31A6DE957ADB7A23E155EF8E9F80E67DC763443053E0014FBA9E91F4EEBC6F.exeunhsmqk.exepid Process 2520 1E31A6DE957ADB7A23E155EF8E9F80E67DC763443053E0014FBA9E91F4EEBC6F.exe 2520 1E31A6DE957ADB7A23E155EF8E9F80E67DC763443053E0014FBA9E91F4EEBC6F.exe 2680 unhsmqk.exe 2680 unhsmqk.exe -
Drops file in Program Files directory 64 IoCs
Processes:
CaEsb.exedescription ioc Process File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe CaEsb.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroBroker.exe CaEsb.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Eula.exe CaEsb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe CaEsb.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\shvlzm.exe CaEsb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\kinit.exe CaEsb.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe CaEsb.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\chkrzm.exe CaEsb.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe CaEsb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCICONS.EXE CaEsb.exe File opened for modification C:\Program Files (x86)\Windows Mail\wabmig.exe CaEsb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe CaEsb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe CaEsb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe CaEsb.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\Mahjong.exe CaEsb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\excelcnv.exe CaEsb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORDB.EXE CaEsb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE CaEsb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jinfo.exe CaEsb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmic.exe CaEsb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmiregistry.exe CaEsb.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\MineSweeper.exe CaEsb.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe CaEsb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE CaEsb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe CaEsb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe CaEsb.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe CaEsb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\ONELEV.EXE CaEsb.exe File opened for modification C:\Program Files\Windows Mail\WinMail.exe CaEsb.exe File opened for modification C:\Program Files\Java\jre7\bin\javaws.exe CaEsb.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\sidebar.exe CaEsb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe CaEsb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\keytool.exe CaEsb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack200.exe CaEsb.exe File opened for modification C:\Program Files\Java\jre7\bin\keytool.exe CaEsb.exe File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe CaEsb.exe File opened for modification C:\Program Files\Java\jre7\bin\rmid.exe CaEsb.exe File opened for modification C:\Program Files\Microsoft Office\Office14\MSOHTMED.EXE CaEsb.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SC_Reader.exe CaEsb.exe File opened for modification C:\Program Files\7-Zip\7zG.exe CaEsb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe CaEsb.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe CaEsb.exe File opened for modification C:\Program Files\Windows Journal\PDIALOG.exe CaEsb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe CaEsb.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe CaEsb.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe CaEsb.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe CaEsb.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe CaEsb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jsadebugd.exe CaEsb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\INFOPATH.EXE CaEsb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe CaEsb.exe File opened for modification C:\Program Files\Java\jre7\bin\unpack200.exe CaEsb.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe CaEsb.exe File opened for modification C:\Program Files\Java\jre7\bin\java.exe CaEsb.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe CaEsb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOSYNC.EXE CaEsb.exe File opened for modification C:\Program Files (x86)\Windows Mail\wab.exe CaEsb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe CaEsb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe CaEsb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOUC.EXE CaEsb.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe CaEsb.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe CaEsb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CLVIEW.EXE CaEsb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe CaEsb.exe -
Drops file in Windows directory 2 IoCs
Processes:
1E31A6DE957ADB7A23E155EF8E9F80E67DC763443053E0014FBA9E91F4EEBC6F.exedescription ioc Process File created C:\Windows\Tasks\unhsmqk.job 1E31A6DE957ADB7A23E155EF8E9F80E67DC763443053E0014FBA9E91F4EEBC6F.exe File opened for modification C:\Windows\Tasks\unhsmqk.job 1E31A6DE957ADB7A23E155EF8E9F80E67DC763443053E0014FBA9E91F4EEBC6F.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
unhsmqk.exeCaEsb.execmd.exe1E31A6DE957ADB7A23E155EF8E9F80E67DC763443053E0014FBA9E91F4EEBC6F.exeCaEsb.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unhsmqk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CaEsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1E31A6DE957ADB7A23E155EF8E9F80E67DC763443053E0014FBA9E91F4EEBC6F.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CaEsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies data under HKEY_USERS 3 IoCs
Processes:
CaEsb.exedescription ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ CaEsb.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" CaEsb.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" CaEsb.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
1E31A6DE957ADB7A23E155EF8E9F80E67DC763443053E0014FBA9E91F4EEBC6F.exepid Process 2520 1E31A6DE957ADB7A23E155EF8E9F80E67DC763443053E0014FBA9E91F4EEBC6F.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
1E31A6DE957ADB7A23E155EF8E9F80E67DC763443053E0014FBA9E91F4EEBC6F.exeCaEsb.exetaskeng.exeunhsmqk.exeCaEsb.exedescription pid Process procid_target PID 2520 wrote to memory of 1720 2520 1E31A6DE957ADB7A23E155EF8E9F80E67DC763443053E0014FBA9E91F4EEBC6F.exe 30 PID 2520 wrote to memory of 1720 2520 1E31A6DE957ADB7A23E155EF8E9F80E67DC763443053E0014FBA9E91F4EEBC6F.exe 30 PID 2520 wrote to memory of 1720 2520 1E31A6DE957ADB7A23E155EF8E9F80E67DC763443053E0014FBA9E91F4EEBC6F.exe 30 PID 2520 wrote to memory of 1720 2520 1E31A6DE957ADB7A23E155EF8E9F80E67DC763443053E0014FBA9E91F4EEBC6F.exe 30 PID 1720 wrote to memory of 2908 1720 CaEsb.exe 32 PID 1720 wrote to memory of 2908 1720 CaEsb.exe 32 PID 1720 wrote to memory of 2908 1720 CaEsb.exe 32 PID 1720 wrote to memory of 2908 1720 CaEsb.exe 32 PID 2612 wrote to memory of 2680 2612 taskeng.exe 35 PID 2612 wrote to memory of 2680 2612 taskeng.exe 35 PID 2612 wrote to memory of 2680 2612 taskeng.exe 35 PID 2612 wrote to memory of 2680 2612 taskeng.exe 35 PID 2680 wrote to memory of 1740 2680 unhsmqk.exe 36 PID 2680 wrote to memory of 1740 2680 unhsmqk.exe 36 PID 2680 wrote to memory of 1740 2680 unhsmqk.exe 36 PID 2680 wrote to memory of 1740 2680 unhsmqk.exe 36 PID 1740 wrote to memory of 2988 1740 CaEsb.exe 37 PID 1740 wrote to memory of 2988 1740 CaEsb.exe 37 PID 1740 wrote to memory of 2988 1740 CaEsb.exe 37 PID 1740 wrote to memory of 2988 1740 CaEsb.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\1E31A6DE957ADB7A23E155EF8E9F80E67DC763443053E0014FBA9E91F4EEBC6F.exe"C:\Users\Admin\AppData\Local\Temp\1E31A6DE957ADB7A23E155EF8E9F80E67DC763443053E0014FBA9E91F4EEBC6F.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\CaEsb.exeC:\Users\Admin\AppData\Local\Temp\CaEsb.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\3b9813f2.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:2908
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {3003ECD1-5AB9-401B-A1E6-90B97AC1E5AC} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\ProgramData\welds\unhsmqk.exeC:\ProgramData\welds\unhsmqk.exe start2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\TEMP\CaEsb.exeC:\Windows\TEMP\CaEsb.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Windows\TEMP\46ad45e2.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:2988
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD59ad0e9c3ba18150e9bb1176cd3cc5cfb
SHA1ca69a444c9bdb2b80411cd9ba8a3be06a87053c2
SHA25669b22d283fd4a6ce1c9f69f610449b016fdbb7ac1f8c23e199b3c72d7f75c61d
SHA51278af683bfb37d139a1cb3e3050b1a7075443197fec209d376aafdaa0694590de1a9103dd82725649dd4b35d7485e5b7a92f74d59a531ebe06fef513e15f3650b
-
Filesize
185B
MD57b509a509fe267a86cc260786282308a
SHA1d02bd3f6706b18e3114b54f6f19584f5192f1eac
SHA256a7f6695ad88e91392af899431a56eb13984186958d1ee56739d0f6f12c2d15d4
SHA51238810daa4b5c69492593bbeaa912daaac0e04ba36fc9811604722b1fb7bf113d07ccfe88b12d7a8ced733a517aeae04425211481e64147bf611faf4bb255bf1b
-
Filesize
15KB
MD5f7d21de5c4e81341eccd280c11ddcc9a
SHA1d4e9ef10d7685d491583c6fa93ae5d9105d815bd
SHA2564485df22c627fa0bb899d79aa6ff29bc5be1dbc3caa2b7a490809338d54b7794
SHA512e4553b86b083996038bacfb979ad0b86f578f95185d8efac34a77f6cc73e491d4f70e1449bbc9eb1d62f430800c1574101b270e1cb0eeed43a83049a79b636a3
-
Filesize
131B
MD5dc195b1b473d67af38492736ee970f4e
SHA1faa0dc194c8c52adb995aaa2639f892f0eb600e2
SHA2566c58f86f4a432855fab37abf47ca4a6504242c88177e5a4bdfd8ba6c780be925
SHA512e9d3625a2ef7fceccf44bb65daa828a54e39fca50ad982477751d9fc48004207195ff784b824c4ab521451ad54f2e4577fb2f2ae6eca652335c21e4ff95de3b3