Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 16:48
Behavioral task
behavioral1
Sample
EZFNLauncher.exe
Resource
win7-20240903-en
General
-
Target
EZFNLauncher.exe
-
Size
6.0MB
-
MD5
cd48b5be93cdbce97532e6901a9f2ab0
-
SHA1
4c04d9357f2ffb49e85b0b561d7701b38246880e
-
SHA256
e7cfe19e2f7b88620b0fde61891065ace2b4a2c200aea8e1ad82c4abd171fe98
-
SHA512
6dd9a38f998d3d8d8eff3c3b8a0b59f08a244a9279d7ea293d176e58f50a16e853147b2495e20702256a894603c9a3e9e916a1d51455616a900e2360c5025cd6
-
SSDEEP
98304:qAEtdFByEamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RyBMTv3OssLSu:qnFMleN/FJMIDJf0gsAGK4RyuTOWu
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2716 EZFNLauncher.exe -
resource yara_rule behavioral1/files/0x00050000000187a5-21.dat upx behavioral1/memory/2716-23-0x000007FEF6290000-0x000007FEF66FE000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2716 1620 EZFNLauncher.exe 30 PID 1620 wrote to memory of 2716 1620 EZFNLauncher.exe 30 PID 1620 wrote to memory of 2716 1620 EZFNLauncher.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\EZFNLauncher.exe"C:\Users\Admin\AppData\Local\Temp\EZFNLauncher.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\EZFNLauncher.exe"C:\Users\Admin\AppData\Local\Temp\EZFNLauncher.exe"2⤵
- Loads dropped DLL
PID:2716
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5178a0f45fde7db40c238f1340a0c0ec0
SHA1dcd2d3d14e06da3e8d7dc91a69b5fd785768b5fe
SHA2569fcb5ad15bd33dd72122a171a5d950e8e47ceda09372f25df828010cde24b8ed
SHA5124b790046787e57b9414a796838a026b1530f497a75c8e62d62b56f8c16a0cbedbefad3d4be957bc18379f64374d8d3bf62d3c64b53476c7c5005a7355acd2cee