Analysis
-
max time kernel
119s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 05:55
Static task
static1
Behavioral task
behavioral1
Sample
92e09442cc32ea4e1f12b81e2e9be790N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
92e09442cc32ea4e1f12b81e2e9be790N.exe
Resource
win10v2004-20240802-en
General
-
Target
92e09442cc32ea4e1f12b81e2e9be790N.exe
-
Size
331KB
-
MD5
92e09442cc32ea4e1f12b81e2e9be790
-
SHA1
33a62311b8b2ac55e831d99fbf341ab2df8008a8
-
SHA256
321e42634ada276c109f6aa705045d5c789ce73ba1e4091bdf933c031da6d72a
-
SHA512
6426986a84fdbfd6055e18ea8342ac7903cbd67880fdbd7c628dc8d1d55fe52835cd2129527c18635e11512fc19a02dec1b64b6370ea9ca49dc2740bd747e66c
-
SSDEEP
6144:ID2nT5hLggksLfkhzhOQX3sic3cDSsDda8QPyOVKD:vT70gXfihOQX3sdsDSsSPrV6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2712 EpicScale.exe -
Loads dropped DLL 1 IoCs
pid Process 2260 92e09442cc32ea4e1f12b81e2e9be790N.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\EpicScale = "C:\\ProgramData\\EpicScale\\EpicScale.exe EpicScale StartMinimized" EpicScale.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 92e09442cc32ea4e1f12b81e2e9be790N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EpicScale.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2712 2260 92e09442cc32ea4e1f12b81e2e9be790N.exe 30 PID 2260 wrote to memory of 2712 2260 92e09442cc32ea4e1f12b81e2e9be790N.exe 30 PID 2260 wrote to memory of 2712 2260 92e09442cc32ea4e1f12b81e2e9be790N.exe 30 PID 2260 wrote to memory of 2712 2260 92e09442cc32ea4e1f12b81e2e9be790N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\92e09442cc32ea4e1f12b81e2e9be790N.exe"C:\Users\Admin\AppData\Local\Temp\92e09442cc32ea4e1f12b81e2e9be790N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\ProgramData\EpicScale\EpicScale.exe"C:\ProgramData\EpicScale\EpicScale.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
331KB
MD592e09442cc32ea4e1f12b81e2e9be790
SHA133a62311b8b2ac55e831d99fbf341ab2df8008a8
SHA256321e42634ada276c109f6aa705045d5c789ce73ba1e4091bdf933c031da6d72a
SHA5126426986a84fdbfd6055e18ea8342ac7903cbd67880fdbd7c628dc8d1d55fe52835cd2129527c18635e11512fc19a02dec1b64b6370ea9ca49dc2740bd747e66c