Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
16/08/2024, 22:35
Static task
static1
Behavioral task
behavioral1
Sample
4f90eaab7eb0841179e8e9036ba4e28f06534f8c41cf2f0476e6c2bc2c471f64.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4f90eaab7eb0841179e8e9036ba4e28f06534f8c41cf2f0476e6c2bc2c471f64.exe
Resource
win10v2004-20240802-en
General
-
Target
4f90eaab7eb0841179e8e9036ba4e28f06534f8c41cf2f0476e6c2bc2c471f64.exe
-
Size
484KB
-
MD5
fa9d749edbd2226f749a2172cd85effe
-
SHA1
20f7c886deb996bc48d1bf8583563fd8889071ba
-
SHA256
4f90eaab7eb0841179e8e9036ba4e28f06534f8c41cf2f0476e6c2bc2c471f64
-
SHA512
b79f77a58fb2524a0e8a0d57f9b10a80653e31d268714cfa85741f65882361a6cca000883fd13d645eba45df06976f188f3d64ea5af305e5fb07cca4f477702a
-
SSDEEP
12288:ELPkCDt1EG2XVekhdeTM8gHBNPdUSTBHHRm5UHxs:ELPkQ1bqAaNPdUsxcU2
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3016 mouneown.exe 2276 ~E4F2.tmp 2328 eudcnced.exe -
Loads dropped DLL 3 IoCs
pid Process 3020 4f90eaab7eb0841179e8e9036ba4e28f06534f8c41cf2f0476e6c2bc2c471f64.exe 3020 4f90eaab7eb0841179e8e9036ba4e28f06534f8c41cf2f0476e6c2bc2c471f64.exe 3016 mouneown.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\eudcnced = "C:\\Users\\Admin\\AppData\\Roaming\\moundt32\\mouneown.exe" 4f90eaab7eb0841179e8e9036ba4e28f06534f8c41cf2f0476e6c2bc2c471f64.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\eudcnced.exe 4f90eaab7eb0841179e8e9036ba4e28f06534f8c41cf2f0476e6c2bc2c471f64.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2776 3020 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4f90eaab7eb0841179e8e9036ba4e28f06534f8c41cf2f0476e6c2bc2c471f64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mouneown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eudcnced.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3016 mouneown.exe 1204 Explorer.EXE 2328 eudcnced.exe 1204 Explorer.EXE 2328 eudcnced.exe 1204 Explorer.EXE 2328 eudcnced.exe 1204 Explorer.EXE 2328 eudcnced.exe 1204 Explorer.EXE 2328 eudcnced.exe 1204 Explorer.EXE 2328 eudcnced.exe 1204 Explorer.EXE 2328 eudcnced.exe 1204 Explorer.EXE 2328 eudcnced.exe 1204 Explorer.EXE 2328 eudcnced.exe 1204 Explorer.EXE 2328 eudcnced.exe 1204 Explorer.EXE 2328 eudcnced.exe 1204 Explorer.EXE 2328 eudcnced.exe 1204 Explorer.EXE 2328 eudcnced.exe 1204 Explorer.EXE 2328 eudcnced.exe 1204 Explorer.EXE 2328 eudcnced.exe 1204 Explorer.EXE 2328 eudcnced.exe 1204 Explorer.EXE 2328 eudcnced.exe 1204 Explorer.EXE 2328 eudcnced.exe 1204 Explorer.EXE 2328 eudcnced.exe 1204 Explorer.EXE 2328 eudcnced.exe 1204 Explorer.EXE 2328 eudcnced.exe 1204 Explorer.EXE 2328 eudcnced.exe 1204 Explorer.EXE 2328 eudcnced.exe 1204 Explorer.EXE 2328 eudcnced.exe 1204 Explorer.EXE 2328 eudcnced.exe 1204 Explorer.EXE 2328 eudcnced.exe 1204 Explorer.EXE 2328 eudcnced.exe 1204 Explorer.EXE 2328 eudcnced.exe 1204 Explorer.EXE 2328 eudcnced.exe 1204 Explorer.EXE 2328 eudcnced.exe 1204 Explorer.EXE 2328 eudcnced.exe 1204 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3016 mouneown.exe Token: SeShutdownPrivilege 1204 Explorer.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3020 wrote to memory of 3016 3020 4f90eaab7eb0841179e8e9036ba4e28f06534f8c41cf2f0476e6c2bc2c471f64.exe 31 PID 3020 wrote to memory of 3016 3020 4f90eaab7eb0841179e8e9036ba4e28f06534f8c41cf2f0476e6c2bc2c471f64.exe 31 PID 3020 wrote to memory of 3016 3020 4f90eaab7eb0841179e8e9036ba4e28f06534f8c41cf2f0476e6c2bc2c471f64.exe 31 PID 3020 wrote to memory of 3016 3020 4f90eaab7eb0841179e8e9036ba4e28f06534f8c41cf2f0476e6c2bc2c471f64.exe 31 PID 3016 wrote to memory of 2276 3016 mouneown.exe 32 PID 3016 wrote to memory of 2276 3016 mouneown.exe 32 PID 3016 wrote to memory of 2276 3016 mouneown.exe 32 PID 3016 wrote to memory of 2276 3016 mouneown.exe 32 PID 2276 wrote to memory of 1204 2276 ~E4F2.tmp 21 PID 3020 wrote to memory of 2776 3020 4f90eaab7eb0841179e8e9036ba4e28f06534f8c41cf2f0476e6c2bc2c471f64.exe 34 PID 3020 wrote to memory of 2776 3020 4f90eaab7eb0841179e8e9036ba4e28f06534f8c41cf2f0476e6c2bc2c471f64.exe 34 PID 3020 wrote to memory of 2776 3020 4f90eaab7eb0841179e8e9036ba4e28f06534f8c41cf2f0476e6c2bc2c471f64.exe 34 PID 3020 wrote to memory of 2776 3020 4f90eaab7eb0841179e8e9036ba4e28f06534f8c41cf2f0476e6c2bc2c471f64.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\4f90eaab7eb0841179e8e9036ba4e28f06534f8c41cf2f0476e6c2bc2c471f64.exe"C:\Users\Admin\AppData\Local\Temp\4f90eaab7eb0841179e8e9036ba4e28f06534f8c41cf2f0476e6c2bc2c471f64.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Roaming\moundt32\mouneown.exe"C:\Users\Admin\AppData\Roaming\moundt32"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\~E4F2.tmp1204 496136 3016 14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2276
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 2523⤵
- Program crash
PID:2776
-
-
-
C:\Windows\SysWOW64\eudcnced.exeC:\Windows\SysWOW64\eudcnced.exe -s1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
484KB
MD5987cd766f64c377dce57c92152a7f53e
SHA1cf2846e790c8661921de2d08b9fccd07e5c755e5
SHA256c7f232f6ae268132bcaa99866baab2b85e397a9178ced6695d05bc088e906272
SHA51254c476aebde04c96b5927bc21a145a2e3f8184f77ac082263c1551af68f0154ec87b3ceade54b56b4b4823eeef922adc8141b0333e368ced0630b3a9e9498505
-
Filesize
8KB
MD5aac3165ece2959f39ff98334618d10d9
SHA1020a191bfdc70c1fbd3bf74cd7479258bd197f51
SHA25696fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974
SHA5129eb876812a6a13dd4b090788c2b1d9e9a2e25370598ed5c040f82e6f378edc4b78d58bc8f60d5a559ea57b1edcf3a144bfe09454a9928997173db8279d5b40cf