Analysis Overview
SHA256
6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9
Threat Level: Shows suspicious behavior
The file 6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9 was found to be: Shows suspicious behavior.
Malicious Activity Summary
Loads dropped DLL
Drops startup file
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Program crash
Unsigned PE
Suspicious use of AdjustPrivilegeToken
Gathers network information
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-08-25 09:34
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-08-25 09:34
Reported
2024-08-25 09:37
Platform
win7-20240704-en
Max time kernel
150s
Max time network
152s
Command Line
Signatures
Drops startup file
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe.lnk | C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe | N/A |
Enumerates physical storage devices
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\NETSTAT.EXE | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\WScript.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\NETSTAT.EXE | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
Gathers network information
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\NETSTAT.EXE | N/A |
| N/A | N/A | C:\Windows\SysWOW64\NETSTAT.EXE | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\NETSTAT.EXE | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\NETSTAT.EXE | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe
"C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe"
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c netstat -an
C:\Windows\SysWOW64\NETSTAT.EXE
netstat -an
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c netstat -an
C:\Windows\SysWOW64\NETSTAT.EXE
netstat -an
C:\Windows\SysWOW64\cmd.exe
cmd /c c:\Del.bat
C:\Windows\SysWOW64\WScript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\delay.vbs"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | whois.pconline.com.cn | udp |
| CN | 14.29.101.160:80 | whois.pconline.com.cn | tcp |
| US | 8.8.8.8:53 | gudlao.b1.luyouxia.net | udp |
| CN | 123.99.198.201:40094 | gudlao.b1.luyouxia.net | tcp |
Files
\Users\Admin\AppData\Local\Temp\E2EECore.2.7.2.dll
| MD5 | 8b6c94bbdbfb213e94a5dcb4fac28ce3 |
| SHA1 | b56102ca4f03556f387f8b30e2b404efabe0cb65 |
| SHA256 | 982a177924762f270b36fe34c7d6847392b48ae53151dc2011078dceef487a53 |
| SHA512 | 9d6d63b5d8cf7a978d7e91126d7a343c2f7acd00022da9d692f63e50835fdd84a59a93328564f10622f2b1f6adfd7febdd98b8ddb294d0754ed45cc9c165d25a |
C:\Del.bat
| MD5 | da117a17f814b5d1a13c2e7f2e6a794e |
| SHA1 | b94bde235c53c3947a9dd094a30aef626bf4dace |
| SHA256 | 17b890eaf7b4af3ad68a9f9e55081c8c576b10061c3709917e29d47ec421089b |
| SHA512 | 87eb8958b1d3ce6241feafdd1e84d635b695597061dbb0a62249c1948952149c32091ce15dac66f0da930e764b145e08d9573e9d067a11a062de2fff46dacb7e |
memory/2780-13-0x0000000010000000-0x0000000010013000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\delay.vbs
| MD5 | 5ccc803b59fdbcdea8fd7510e8d0fc04 |
| SHA1 | 934485e70bf33c0860d346c92f85231be6dbc606 |
| SHA256 | 56dbbffa3c9452f514e5f85f589cd8ee557ddd79283c3456bb37296c482d4631 |
| SHA512 | a0229aba0a6fda2f9edd6c363b5de5eae1da0f3e04b687ac893cc6f01cde7d969799333b576b0277363339906570ef33f30f5b3f6738cf16a5f49316fde9a642 |
memory/2780-82-0x0000000010000000-0x0000000010013000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-08-25 09:34
Reported
2024-08-25 09:37
Platform
win10v2004-20240802-en
Max time kernel
136s
Max time network
133s
Command Line
Signatures
Drops startup file
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe.lnk | C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe | N/A |
Enumerates physical storage devices
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\NETSTAT.EXE | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
Gathers network information
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\NETSTAT.EXE | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\NETSTAT.EXE | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 220 wrote to memory of 2868 | N/A | C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe | C:\Windows\SysWOW64\cmd.exe |
| PID 220 wrote to memory of 2868 | N/A | C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe | C:\Windows\SysWOW64\cmd.exe |
| PID 220 wrote to memory of 2868 | N/A | C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe | C:\Windows\SysWOW64\cmd.exe |
| PID 2868 wrote to memory of 1356 | N/A | C:\Windows\SysWOW64\cmd.exe | C:\Windows\SysWOW64\NETSTAT.EXE |
| PID 2868 wrote to memory of 1356 | N/A | C:\Windows\SysWOW64\cmd.exe | C:\Windows\SysWOW64\NETSTAT.EXE |
| PID 2868 wrote to memory of 1356 | N/A | C:\Windows\SysWOW64\cmd.exe | C:\Windows\SysWOW64\NETSTAT.EXE |
Processes
C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe
"C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe"
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c netstat -an
C:\Windows\SysWOW64\NETSTAT.EXE
netstat -an
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 220 -ip 220
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 220 -s 1476
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4400,i,3210801877307184477,8078594481454001567,262144 --variations-seed-version --mojo-platform-channel-handle=4236 /prefetch:8
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 64.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 150.171.27.10:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.59.114.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 48.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
Files
C:\Users\Admin\AppData\Local\Temp\E2EECore.2.7.2.dll
| MD5 | 8b6c94bbdbfb213e94a5dcb4fac28ce3 |
| SHA1 | b56102ca4f03556f387f8b30e2b404efabe0cb65 |
| SHA256 | 982a177924762f270b36fe34c7d6847392b48ae53151dc2011078dceef487a53 |
| SHA512 | 9d6d63b5d8cf7a978d7e91126d7a343c2f7acd00022da9d692f63e50835fdd84a59a93328564f10622f2b1f6adfd7febdd98b8ddb294d0754ed45cc9c165d25a |