Analysis
-
max time kernel
59s -
max time network
54s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 19:51
Static task
static1
Behavioral task
behavioral1
Sample
050b32129f59d723930d690463cd24921effaf84a5f673e78f9de2282feb474a.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
050b32129f59d723930d690463cd24921effaf84a5f673e78f9de2282feb474a.exe
Resource
win10v2004-20240802-en
General
-
Target
050b32129f59d723930d690463cd24921effaf84a5f673e78f9de2282feb474a.exe
-
Size
239KB
-
MD5
3a28c8e2aa4546bc7a113ec02b5811ae
-
SHA1
bdcefe00e4af5dae38119b67a758d2abb2c775b2
-
SHA256
050b32129f59d723930d690463cd24921effaf84a5f673e78f9de2282feb474a
-
SHA512
d982691bb0d209252bf8aa43707b9bcb09166ff8d3e71af04fe7f19775e5f58f5587a03341098d21d2235498b6a2db6da93c9b52ae2a36f032388d78066ad420
-
SSDEEP
3072:hsXRmUIMitiMQose27vc+Eld+xZp2vPRL1tT06zJoxAWBcKpSP//dwR1l9B4hT5:GR5IuMQoseGk7RZBGxAycKpSPX2pUr
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" eapp3hst32.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation 050b32129f59d723930d690463cd24921effaf84a5f673e78f9de2282feb474a.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation eapp3hst32.exe -
Executes dropped EXE 2 IoCs
pid Process 2380 eapp3hst32.exe 2248 eapp3hst32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\eapp3hst32 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\050b32129f59d723930d690463cd24921effaf84a5f673e78f9de2282feb474a.exe" 050b32129f59d723930d690463cd24921effaf84a5f673e78f9de2282feb474a.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 11 pastebin.com 14 pastebin.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2380 set thread context of 4716 2380 eapp3hst32.exe 95 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2040 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3196 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe 2380 eapp3hst32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2380 eapp3hst32.exe Token: SeDebugPrivilege 4716 InstallUtil.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4304 wrote to memory of 2380 4304 050b32129f59d723930d690463cd24921effaf84a5f673e78f9de2282feb474a.exe 82 PID 4304 wrote to memory of 2380 4304 050b32129f59d723930d690463cd24921effaf84a5f673e78f9de2282feb474a.exe 82 PID 4304 wrote to memory of 4712 4304 050b32129f59d723930d690463cd24921effaf84a5f673e78f9de2282feb474a.exe 83 PID 4304 wrote to memory of 4712 4304 050b32129f59d723930d690463cd24921effaf84a5f673e78f9de2282feb474a.exe 83 PID 4304 wrote to memory of 4528 4304 050b32129f59d723930d690463cd24921effaf84a5f673e78f9de2282feb474a.exe 85 PID 4304 wrote to memory of 4528 4304 050b32129f59d723930d690463cd24921effaf84a5f673e78f9de2282feb474a.exe 85 PID 4528 wrote to memory of 2040 4528 cmd.exe 87 PID 4528 wrote to memory of 2040 4528 cmd.exe 87 PID 2380 wrote to memory of 3196 2380 eapp3hst32.exe 88 PID 2380 wrote to memory of 3196 2380 eapp3hst32.exe 88 PID 2380 wrote to memory of 4716 2380 eapp3hst32.exe 95 PID 2380 wrote to memory of 4716 2380 eapp3hst32.exe 95 PID 2380 wrote to memory of 4716 2380 eapp3hst32.exe 95 PID 2380 wrote to memory of 4716 2380 eapp3hst32.exe 95 PID 2380 wrote to memory of 4716 2380 eapp3hst32.exe 95 PID 2380 wrote to memory of 4716 2380 eapp3hst32.exe 95 PID 2380 wrote to memory of 4716 2380 eapp3hst32.exe 95 PID 2380 wrote to memory of 4716 2380 eapp3hst32.exe 95 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\050b32129f59d723930d690463cd24921effaf84a5f673e78f9de2282feb474a.exe"C:\Users\Admin\AppData\Local\Temp\050b32129f59d723930d690463cd24921effaf84a5f673e78f9de2282feb474a.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\AppData\Local\_foldernamelocalappdata_\eapp3hst32.exe"C:\Users\Admin\AppData\Local\_foldernamelocalappdata_\eapp3hst32.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn Admin /tr "\"C:\Users\Admin\AppData\Local\_foldernamelocalappdata_\eapp3hst32.exe\" arguments" /sc MINUTE /mo 13⤵
- Scheduled Task/Job: Scheduled Task
PID:3196
-
-
\??\c:\windows\microsoft.net\framework\v2.0.50727\InstallUtil.exe"c:\windows\microsoft.net\framework\v2.0.50727\\InstallUtil.exe" C:\Users\Admin\AppData\Local\_foldernamelocalappdata_\eapp3hst32.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4716
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:4712
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 && del "C:\Users\Admin\AppData\Local\Temp\050b32129f59d723930d690463cd24921effaf84a5f673e78f9de2282feb474a.exe" && del "C:\Users\Admin\AppData\Local\Temp\050b32129f59d723930d690463cd24921effaf84a5f673e78f9de2282feb474a.exe.config"2⤵
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\system32\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:2040
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:224
-
C:\Users\Admin\AppData\Local\_foldernamelocalappdata_\eapp3hst32.exeC:\Users\Admin\AppData\Local\_foldernamelocalappdata_\eapp3hst32.exe arguments1⤵
- Executes dropped EXE
PID:2248
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239KB
MD51b7e1fee225f67b9fdef1f31069fe672
SHA1b600cc886349cabaa51340dfbd310e9739d23737
SHA2563579fec025f4534878d3fd5e1fc0eaf8bb05209c7c95f3025ea9f2be761a69d4
SHA5121d719e74876e3b560b5ff3145eb13fb8c6b820ffa13da61046345d959d222e9de00447ed00b1d1e8d84cb3e9807bef673d78640eda2959df3d5d966749810743
-
Filesize
1KB
MD5dd3d04c365984b4ec57a80503f81fddf
SHA1c55fbcb61818e47dac9aae465faff91f0805bd7c
SHA25640a59ca9744dc3d4647f246b2dc553f37f8095418c1b48a9bd94cdb5c03dbc5c
SHA5120dd459def2abe9e3f0d1251049a0755c63f7dd3d85e91dba272c3f479f2578e3f3f2379e1cd6913190f7f596af721201eb5d9423ab28aed72bde5cd3cac7f785