Analysis
-
max time kernel
141s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2024 09:14
Static task
static1
Behavioral task
behavioral1
Sample
Epsilon Menu.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Epsilon Menu.exe
Resource
win10v2004-20240802-en
General
-
Target
Epsilon Menu.exe
-
Size
1.6MB
-
MD5
a20dbe3b37599389b5e6625a878e8404
-
SHA1
586b61f2c53ec7b94d73d95ceaf4aa90c957a621
-
SHA256
857b6be9fa993194bc629793d5434a3fdcfee15595ddd26ea2223a5bb5ba06c4
-
SHA512
9e532cbcd8e44d8586ad3bd586db0328bc495e4bcb1a91ebf503f3f00c0c284369f0ce4a52da0af8b40b1ae1b97fc4f98e5bc589a8020d6da83de09d1eb9c364
-
SSDEEP
24576:gawwKusHwEwS2fGqKz/zO6I6h6gEGe/NIsWvMyCShxCV:wwREDDpyShv2NuMsCV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2192 Epsilon Menu.tmp -
Loads dropped DLL 1 IoCs
pid Process 2192 Epsilon Menu.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Epsilon Menu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Epsilon Menu.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3424 wrote to memory of 2192 3424 Epsilon Menu.exe 91 PID 3424 wrote to memory of 2192 3424 Epsilon Menu.exe 91 PID 3424 wrote to memory of 2192 3424 Epsilon Menu.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\Epsilon Menu.exe"C:\Users\Admin\AppData\Local\Temp\Epsilon Menu.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\is-EFP9O.tmp\Epsilon Menu.tmp"C:\Users\Admin\AppData\Local\Temp\is-EFP9O.tmp\Epsilon Menu.tmp" /SL5="$902D0,865850,776192,C:\Users\Admin\AppData\Local\Temp\Epsilon Menu.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3808,i,4174666705242427184,7333705955694532165,262144 --variations-seed-version --mojo-platform-channel-handle=4500 /prefetch:81⤵PID:4416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD53c644f42726c7ebf2cc7a7e7b3c0cff6
SHA147339d836ff963efbc84ffe7bda82ef73f67c5ed
SHA2561a1ddbdef52043dd33cd01ac95a28ab00e5eac4b1d197f82c9cb71eaa11d458f
SHA512149466d7630f21c83c5a2cf805e0d82b2702c69b7f1da419eb4fc5d737f8b2f1c555d8383bdf091313ae390bf80d0f490ca68cb5a78eef4ce06f37f251e7af22
-
Filesize
232KB
MD555c310c0319260d798757557ab3bf636
SHA10892eb7ed31d8bb20a56c6835990749011a2d8de
SHA25654e7e0ad32a22b775131a6288f083ed3286a9a436941377fc20f85dd9ad983ed
SHA512e0082109737097658677d7963cbf28d412dca3fa8f5812c2567e53849336ce45ebae2c0430df74bfe16c0f3eebb46961bc1a10f32ca7947692a900162128ae57