Malware Analysis Report

2025-04-13 21:39

Sample ID 240825-lj59vsxbpd
Target 6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9
SHA256 6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9
Tags
discovery
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9

Threat Level: Shows suspicious behavior

The file 6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9 was found to be: Shows suspicious behavior.

Malicious Activity Summary

discovery

Loads dropped DLL

Drops startup file

Enumerates physical storage devices

System Location Discovery: System Language Discovery

Program crash

Unsigned PE

Suspicious use of AdjustPrivilegeToken

Gathers network information

Suspicious behavior: EnumeratesProcesses

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-08-25 09:34

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-08-25 09:34

Reported

2024-08-25 09:37

Platform

win7-20240704-en

Max time kernel

150s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe"

Signatures

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe.lnk C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\NETSTAT.EXE N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\WScript.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\NETSTAT.EXE N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A

Gathers network information

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\NETSTAT.EXE N/A
N/A N/A C:\Windows\SysWOW64\NETSTAT.EXE N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\NETSTAT.EXE N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\NETSTAT.EXE N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2780 wrote to memory of 2248 N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe C:\Windows\SysWOW64\cmd.exe
PID 2780 wrote to memory of 2248 N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe C:\Windows\SysWOW64\cmd.exe
PID 2780 wrote to memory of 2248 N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe C:\Windows\SysWOW64\cmd.exe
PID 2780 wrote to memory of 2248 N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe C:\Windows\SysWOW64\cmd.exe
PID 2248 wrote to memory of 2824 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\NETSTAT.EXE
PID 2248 wrote to memory of 2824 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\NETSTAT.EXE
PID 2248 wrote to memory of 2824 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\NETSTAT.EXE
PID 2248 wrote to memory of 2824 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\NETSTAT.EXE
PID 2780 wrote to memory of 2800 N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe C:\Windows\SysWOW64\cmd.exe
PID 2780 wrote to memory of 2800 N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe C:\Windows\SysWOW64\cmd.exe
PID 2780 wrote to memory of 2800 N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe C:\Windows\SysWOW64\cmd.exe
PID 2780 wrote to memory of 2800 N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe C:\Windows\SysWOW64\cmd.exe
PID 2800 wrote to memory of 2828 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\NETSTAT.EXE
PID 2800 wrote to memory of 2828 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\NETSTAT.EXE
PID 2800 wrote to memory of 2828 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\NETSTAT.EXE
PID 2800 wrote to memory of 2828 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\NETSTAT.EXE
PID 2780 wrote to memory of 2924 N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe C:\Windows\SysWOW64\cmd.exe
PID 2780 wrote to memory of 2924 N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe C:\Windows\SysWOW64\cmd.exe
PID 2780 wrote to memory of 2924 N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe C:\Windows\SysWOW64\cmd.exe
PID 2780 wrote to memory of 2924 N/A C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe C:\Windows\SysWOW64\cmd.exe
PID 2924 wrote to memory of 3048 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WScript.exe
PID 2924 wrote to memory of 3048 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WScript.exe
PID 2924 wrote to memory of 3048 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WScript.exe
PID 2924 wrote to memory of 3048 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WScript.exe

Processes

C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe

"C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c netstat -an

C:\Windows\SysWOW64\NETSTAT.EXE

netstat -an

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c netstat -an

C:\Windows\SysWOW64\NETSTAT.EXE

netstat -an

C:\Windows\SysWOW64\cmd.exe

cmd /c c:\Del.bat

C:\Windows\SysWOW64\WScript.exe

"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\delay.vbs"

Network

Country Destination Domain Proto
US 8.8.8.8:53 whois.pconline.com.cn udp
CN 14.29.101.160:80 whois.pconline.com.cn tcp
US 8.8.8.8:53 gudlao.b1.luyouxia.net udp
CN 123.99.198.201:40094 gudlao.b1.luyouxia.net tcp

Files

\Users\Admin\AppData\Local\Temp\E2EECore.2.7.2.dll

MD5 8b6c94bbdbfb213e94a5dcb4fac28ce3
SHA1 b56102ca4f03556f387f8b30e2b404efabe0cb65
SHA256 982a177924762f270b36fe34c7d6847392b48ae53151dc2011078dceef487a53
SHA512 9d6d63b5d8cf7a978d7e91126d7a343c2f7acd00022da9d692f63e50835fdd84a59a93328564f10622f2b1f6adfd7febdd98b8ddb294d0754ed45cc9c165d25a

C:\Del.bat

MD5 da117a17f814b5d1a13c2e7f2e6a794e
SHA1 b94bde235c53c3947a9dd094a30aef626bf4dace
SHA256 17b890eaf7b4af3ad68a9f9e55081c8c576b10061c3709917e29d47ec421089b
SHA512 87eb8958b1d3ce6241feafdd1e84d635b695597061dbb0a62249c1948952149c32091ce15dac66f0da930e764b145e08d9573e9d067a11a062de2fff46dacb7e

memory/2780-13-0x0000000010000000-0x0000000010013000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\delay.vbs

MD5 5ccc803b59fdbcdea8fd7510e8d0fc04
SHA1 934485e70bf33c0860d346c92f85231be6dbc606
SHA256 56dbbffa3c9452f514e5f85f589cd8ee557ddd79283c3456bb37296c482d4631
SHA512 a0229aba0a6fda2f9edd6c363b5de5eae1da0f3e04b687ac893cc6f01cde7d969799333b576b0277363339906570ef33f30f5b3f6738cf16a5f49316fde9a642

memory/2780-82-0x0000000010000000-0x0000000010013000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-08-25 09:34

Reported

2024-08-25 09:37

Platform

win10v2004-20240802-en

Max time kernel

136s

Max time network

133s

Command Line

"C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe"

Signatures

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe.lnk C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\NETSTAT.EXE N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A

Gathers network information

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\NETSTAT.EXE N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\NETSTAT.EXE N/A

Processes

C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe

"C:\Users\Admin\AppData\Local\Temp\6c2c5d0bb0277ae084ba6053a630a951d6ffa2de524cb6b8a133f5f25d1410b9.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c netstat -an

C:\Windows\SysWOW64\NETSTAT.EXE

netstat -an

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 220 -ip 220

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 220 -s 1476

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4400,i,3210801877307184477,8078594481454001567,262144 --variations-seed-version --mojo-platform-channel-handle=4236 /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 64.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 150.171.27.10:443 g.bing.com tcp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp

Files

C:\Users\Admin\AppData\Local\Temp\E2EECore.2.7.2.dll

MD5 8b6c94bbdbfb213e94a5dcb4fac28ce3
SHA1 b56102ca4f03556f387f8b30e2b404efabe0cb65
SHA256 982a177924762f270b36fe34c7d6847392b48ae53151dc2011078dceef487a53
SHA512 9d6d63b5d8cf7a978d7e91126d7a343c2f7acd00022da9d692f63e50835fdd84a59a93328564f10622f2b1f6adfd7febdd98b8ddb294d0754ed45cc9c165d25a