Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03/09/2024, 20:26

General

  • Target

    egifan7.exe

  • Size

    23.1MB

  • MD5

    b0a82f7a9aa62c3919fb5c0bfb47deeb

  • SHA1

    f7aff3685134fd68893a6541e3f850ca7a398dd5

  • SHA256

    42fcf328d1c4c8d00fabe339983efeab42fb5bae06a52c4583ab0df8573efdda

  • SHA512

    e7f274318a88fdb5efe89c9918c835ca2ebef53fe6ce0d72f7c1bb50a4c180f484ead2350618f6d2b9ad2821b80b8874a3dab7a563f9bec54ed83a1ef37b7e2d

  • SSDEEP

    393216:f/nir8+5ZtPL1ko9OqEV8KGaXnby6TdWM6M6evmovhDkxT1BrPAeGNqqd77pRMk8:Hnir8w/D13hY+aXuxZM6eOWkZLrPGNBO

Score
4/10

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 7 IoCs
  • Modifies registry class 31 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\egifan7.exe
    "C:\Users\Admin\AppData\Local\Temp\egifan7.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1144
    • C:\Users\Admin\AppData\Local\Temp\is-SL35A.tmp\egifan7.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-SL35A.tmp\egifan7.tmp" /SL5="$30144,23966205,57856,C:\Users\Admin\AppData\Local\Temp\egifan7.exe"
      2⤵
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2388
      • C:\Program Files (x86)\Easy GIF Animator\gifan.exe
        "C:\Program Files (x86)\Easy GIF Animator\gifan.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        PID:1300

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Easy GIF Animator\clipart\icons\Crystal\is-94PK1.tmp

          Filesize

          80KB

          MD5

          0a270f1e654bb75bd8ee8b627084889f

          SHA1

          539d9d5ff1953b96691dd42fb0fada404f204ab3

          SHA256

          d90680f592c60e25f224caf77a0784560fc665460acf3963d624f2c363793393

          SHA512

          1a3106aaadc1d8090f5014b7f354308353b16a31ecf13735c83e9143a55719fc6348c3f4aa44abd4ebda92091c1b6f72aa46fc5a1008104a9f26dfc1a0ed2715

        • C:\Program Files (x86)\Easy GIF Animator\lang\Languages.sib

          Filesize

          399KB

          MD5

          0ddda865b0c0f471123f07a78e5ae878

          SHA1

          6a75f562cebc1a53f22b260ddb6512329d780444

          SHA256

          bae99a87d86800a8fd976a81b0e78a3cc654b99dbd341b924e182179d9fef96f

          SHA512

          d93a82427d6555f562a865d2684d3c678fbd32b673343f2ae1d1321625af631cf908a1c5020f93e028f2fb130395751c7733b0dc500c2c7149364c2798eb494c

        • \Program Files (x86)\Easy GIF Animator\gifan.exe

          Filesize

          35.6MB

          MD5

          7c13002066ac3b2d836d9c635d82a2af

          SHA1

          d370602d619b40ec602f6c5f34cdc1b5f1895f21

          SHA256

          0996d6617139ae70bb50c18133429c8837c10c503245885576c286ec21526042

          SHA512

          21cb333f65e3753bb7b10aaaab8b623b0456ad0215254f783f30c6ce46d9a52f2db32225d561b19d14aeb9e2156e5d458c8da0d7ba6f8e420d17eb5fe92aca78

        • \Program Files (x86)\Easy GIF Animator\libeay32.dll

          Filesize

          1.3MB

          MD5

          075b70241383faefb0fe44d07090eaf0

          SHA1

          ba59b7df027bfc04f3add8c08bc408a927acc32a

          SHA256

          e886954dda4cecdf16fdf8c45d5062692c2051dac2b0f4a8e288480ff9b99b61

          SHA512

          aade3d10d2d956f5f1742695f01f969d8476cae078d4caacb20f6e63ccdee6c14f5e8c5a5ffbee63f23d1deff3db24b414a445b88e8c73038d7e7a66dcce9c95

        • \Program Files (x86)\Easy GIF Animator\ssleay32.dll

          Filesize

          329KB

          MD5

          1eb4662d9344702823efccf6d071f5ad

          SHA1

          89cfd8e7905455f2d2c800e969a0658f935ff937

          SHA256

          c4dbed05760a52833d8d714686ee48efbec44b182d354a9ae8942768a9a19cd2

          SHA512

          a565270d76a3062467cf024f7143bf85456980b170e982082646a8c8365f62ab4120b742f409f253e99443ff0bd7e322312dcfc6dc100849179c64306db2feb2

        • \Program Files (x86)\Easy GIF Animator\unins000.exe

          Filesize

          708KB

          MD5

          d9eccbd6ea6f446e71f8450689710ca4

          SHA1

          c3159d1ead044fea09aa66baf2ce3061d2c4b121

          SHA256

          1b3be8c4bf66724cbb9e7e93470a440eb4b8c0ba564ea323ebb0381ef3f16945

          SHA512

          3d396a574825789e88dde7da72c63f627656b12d1db3d5b87206b3758eda61a398c92429324b3b21b3c14b3abb2ae8cf571f90790b372f54431b89f1eec6a528

        • \Users\Admin\AppData\Local\Temp\is-SL35A.tmp\egifan7.tmp

          Filesize

          697KB

          MD5

          832dab307e54aa08f4b6cdd9b9720361

          SHA1

          ebd007fb7482040ecf34339e4bf917209c1018df

          SHA256

          cc783a04ccbca4edd06564f8ec88fe5a15f1e3bb26cec7de5e090313520d98f3

          SHA512

          358d43522fd460eb1511708e4df22ea454a95e5bc3c4841931027b5fa3fb1dda05d496d8ad0a8b9279b99e6be74220fe243db8f08ef49845e9fb35c350ef4b49

        • memory/1144-0-0x0000000000400000-0x0000000000415000-memory.dmp

          Filesize

          84KB

        • memory/1144-2-0x0000000000401000-0x000000000040C000-memory.dmp

          Filesize

          44KB

        • memory/1144-10-0x0000000000400000-0x0000000000415000-memory.dmp

          Filesize

          84KB

        • memory/1144-471-0x0000000000400000-0x0000000000415000-memory.dmp

          Filesize

          84KB

        • memory/1300-477-0x0000000000400000-0x0000000002D53000-memory.dmp

          Filesize

          41.3MB

        • memory/1300-472-0x0000000000400000-0x0000000002D53000-memory.dmp

          Filesize

          41.3MB

        • memory/1300-478-0x000000000A450000-0x000000000A452000-memory.dmp

          Filesize

          8KB

        • memory/1300-479-0x0000000000400000-0x0000000002D53000-memory.dmp

          Filesize

          41.3MB

        • memory/1300-480-0x0000000000400000-0x0000000002D53000-memory.dmp

          Filesize

          41.3MB

        • memory/1300-481-0x0000000000400000-0x0000000002D53000-memory.dmp

          Filesize

          41.3MB

        • memory/1300-482-0x0000000000400000-0x0000000002D53000-memory.dmp

          Filesize

          41.3MB

        • memory/1300-483-0x0000000000400000-0x0000000002D53000-memory.dmp

          Filesize

          41.3MB

        • memory/2388-470-0x0000000000400000-0x00000000004BE000-memory.dmp

          Filesize

          760KB

        • memory/2388-12-0x0000000000400000-0x00000000004BE000-memory.dmp

          Filesize

          760KB

        • memory/2388-8-0x0000000000400000-0x00000000004BE000-memory.dmp

          Filesize

          760KB