Resubmissions

11/04/2025, 14:49

250411-r65jqsstht 5

17/01/2025, 14:24

250117-rqwxnaskgj 5

Analysis

  • max time kernel
    32s
  • max time network
    39s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/01/2025, 14:24

General

  • Target

    EagleSpy V5.exe

  • Size

    84.6MB

  • MD5

    969c534f3cc8d7aaf63bbc52062717e9

  • SHA1

    243832226215efa2dbd3ee64a228681678636682

  • SHA256

    a45258ce03bc66831fef62ed8f99189ac210051f87c61e4f253e1da637c9607b

  • SHA512

    0358e49946717943d9029aa57d5b62d42cb22b7277b838e8692ed4383f293a55c4353380ef11f22210a44d39f35ea820fa9ac360c9d855f1a5c2049278647de6

  • SSDEEP

    1572864:9iQq9bOuLpK5qJj3zI6tOW6c6y1jj4oxlffYehVOHR9NgLS8qthKEqF2z4+LWC3k:9iQ8JjP1IUOHR/MS1thEF0PLV3

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\EagleSpy V5.exe
    "C:\Users\Admin\AppData\Local\Temp\EagleSpy V5.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2060
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2060 -s 1112
      2⤵
      • Program crash
      PID:3136
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2060 -ip 2060
    1⤵
      PID:2812

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2060-0-0x0000000000D00000-0x0000000006D7A000-memory.dmp

      Filesize

      96.5MB

    • memory/2060-1-0x00000000FF9F0000-0x00000000FFDC1000-memory.dmp

      Filesize

      3.8MB

    • memory/2060-2-0x000000007419E000-0x000000007419F000-memory.dmp

      Filesize

      4KB

    • memory/2060-3-0x0000000000D00000-0x0000000006D7A000-memory.dmp

      Filesize

      96.5MB

    • memory/2060-4-0x000000000BCC0000-0x000000000BEB0000-memory.dmp

      Filesize

      1.9MB

    • memory/2060-5-0x0000000074190000-0x0000000074940000-memory.dmp

      Filesize

      7.7MB

    • memory/2060-6-0x000000000CAD0000-0x000000000D074000-memory.dmp

      Filesize

      5.6MB

    • memory/2060-7-0x000000000C0A0000-0x000000000C132000-memory.dmp

      Filesize

      584KB

    • memory/2060-8-0x000000000C140000-0x000000000C1DC000-memory.dmp

      Filesize

      624KB

    • memory/2060-9-0x000000000C1E0000-0x000000000C246000-memory.dmp

      Filesize

      408KB

    • memory/2060-11-0x00000000FF9F0000-0x00000000FFDC1000-memory.dmp

      Filesize

      3.8MB

    • memory/2060-10-0x0000000000D00000-0x0000000006D7A000-memory.dmp

      Filesize

      96.5MB

    • memory/2060-12-0x0000000074190000-0x0000000074940000-memory.dmp

      Filesize

      7.7MB