Analysis
-
max time kernel
140s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 13:42
Static task
static1
Behavioral task
behavioral1
Sample
Evascape.exe
Resource
win7-20240903-en
General
-
Target
Evascape.exe
-
Size
901KB
-
MD5
cb27f76dc0f2d0812e11888a5cddb0c9
-
SHA1
06a1634a2d10d8b50ff484ed7ce657fbb81831a7
-
SHA256
40a2414a875132e70c7f79dc75e06d9fe3d0d7dd8e34bd1eeafd80d2fea75d3e
-
SHA512
23d27b661c797944e1132bc6638bbdb6a2dcb905810f1cc486ca877d983f8e4692677380834f9add6623f5802d006c33c966ab6a04f29f959fdd21ab0d5a57d2
-
SSDEEP
12288:+ZOS5FM3gKYHqUxxdrDzr1tsLHBNZwM4NaUgWn75wgTTDM1:p+FDKYHLx1rT+uZaUr2gTT
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation Evascape.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Evascape.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Kills process with taskkill 2 IoCs
pid Process 4964 taskkill.exe 4292 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4964 taskkill.exe Token: SeDebugPrivilege 4292 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1692 wrote to memory of 4964 1692 Evascape.exe 83 PID 1692 wrote to memory of 4964 1692 Evascape.exe 83 PID 1692 wrote to memory of 4964 1692 Evascape.exe 83 PID 1692 wrote to memory of 4292 1692 Evascape.exe 85 PID 1692 wrote to memory of 4292 1692 Evascape.exe 85 PID 1692 wrote to memory of 4292 1692 Evascape.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\Evascape.exe"C:\Users\Admin\AppData\Local\Temp\Evascape.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im explorer.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4964
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im taskmgr.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4292
-