Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2024 13:59
Static task
static1
Behavioral task
behavioral1
Sample
sunday (1).exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sunday (1).exe
Resource
win10v2004-20241007-en
General
-
Target
sunday (1).exe
-
Size
1.4MB
-
MD5
f86afa0aeac7460d436c545026a6bf66
-
SHA1
573809df745953ff61b9aaa30dda9fc886957a9d
-
SHA256
4fcc90c2640778103ed184ccb978e934d8b9af249b2834d9ea1ba515a21d9a6b
-
SHA512
390f24c479943d7589a278696531b6fc47ebf2a52d34d7aeb91277f102f912e7c9876c9fd3b475023fef8120f8ce5b2ca41f3d5771bb0979020894493a3f019e
-
SSDEEP
24576:KqDEvCTbMWu7rQYlBQcBiT6rprG8atv91H7pNOsR2VAFT07xA5:KTvC/MTQYxsWR7at/9NFYuFTGxA
Malware Config
Signatures
-
Drops startup file 1 IoCs
Processes:
Esher.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Esher.vbs Esher.exe -
Executes dropped EXE 1 IoCs
Processes:
Esher.exepid process 2312 Esher.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Okeghem\Esher.exe autoit_exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2696 2312 WerFault.exe Esher.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Esher.exesunday (1).exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Esher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sunday (1).exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
sunday (1).exeEsher.exepid process 3580 sunday (1).exe 3580 sunday (1).exe 3580 sunday (1).exe 3580 sunday (1).exe 3580 sunday (1).exe 3580 sunday (1).exe 3580 sunday (1).exe 3580 sunday (1).exe 3580 sunday (1).exe 3580 sunday (1).exe 3580 sunday (1).exe 3580 sunday (1).exe 3580 sunday (1).exe 2312 Esher.exe 2312 Esher.exe 2312 Esher.exe 2312 Esher.exe 2312 Esher.exe 2312 Esher.exe 2312 Esher.exe 2312 Esher.exe 2312 Esher.exe 2312 Esher.exe 2312 Esher.exe 2312 Esher.exe 2312 Esher.exe -
Suspicious use of SendNotifyMessage 26 IoCs
Processes:
sunday (1).exeEsher.exepid process 3580 sunday (1).exe 3580 sunday (1).exe 3580 sunday (1).exe 3580 sunday (1).exe 3580 sunday (1).exe 3580 sunday (1).exe 3580 sunday (1).exe 3580 sunday (1).exe 3580 sunday (1).exe 3580 sunday (1).exe 3580 sunday (1).exe 3580 sunday (1).exe 3580 sunday (1).exe 2312 Esher.exe 2312 Esher.exe 2312 Esher.exe 2312 Esher.exe 2312 Esher.exe 2312 Esher.exe 2312 Esher.exe 2312 Esher.exe 2312 Esher.exe 2312 Esher.exe 2312 Esher.exe 2312 Esher.exe 2312 Esher.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
sunday (1).exeEsher.exedescription pid process target process PID 3580 wrote to memory of 2312 3580 sunday (1).exe Esher.exe PID 3580 wrote to memory of 2312 3580 sunday (1).exe Esher.exe PID 3580 wrote to memory of 2312 3580 sunday (1).exe Esher.exe PID 2312 wrote to memory of 440 2312 Esher.exe RegSvcs.exe PID 2312 wrote to memory of 440 2312 Esher.exe RegSvcs.exe PID 2312 wrote to memory of 440 2312 Esher.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\sunday (1).exe"C:\Users\Admin\AppData\Local\Temp\sunday (1).exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Users\Admin\AppData\Local\Okeghem\Esher.exe"C:\Users\Admin\AppData\Local\Temp\sunday (1).exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\sunday (1).exe"3⤵PID:440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 6963⤵
- Program crash
PID:2696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2312 -ip 23121⤵PID:2120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5f86afa0aeac7460d436c545026a6bf66
SHA1573809df745953ff61b9aaa30dda9fc886957a9d
SHA2564fcc90c2640778103ed184ccb978e934d8b9af249b2834d9ea1ba515a21d9a6b
SHA512390f24c479943d7589a278696531b6fc47ebf2a52d34d7aeb91277f102f912e7c9876c9fd3b475023fef8120f8ce5b2ca41f3d5771bb0979020894493a3f019e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e