Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 04:26
Static task
static1
Behavioral task
behavioral1
Sample
2b2cf69e9948a3323ec772826b58a0d3ce42515604630a1695924380997eff3c.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2b2cf69e9948a3323ec772826b58a0d3ce42515604630a1695924380997eff3c.exe
Resource
win10v2004-20240611-en
General
-
Target
2b2cf69e9948a3323ec772826b58a0d3ce42515604630a1695924380997eff3c.exe
-
Size
11.6MB
-
MD5
d3423bb12deed406afc8eb42dd053d5a
-
SHA1
da3bc943c45f1ef81505de290d8a9461a36ccc3c
-
SHA256
2b2cf69e9948a3323ec772826b58a0d3ce42515604630a1695924380997eff3c
-
SHA512
3756b987dbe149851a9ef592c16938960e1a81763562994cadff10b6fe33aedca5a32a979ee8170f8b7f41ccf72ebd2a26ced7f42fe62701b4a27c39d24663b9
-
SSDEEP
196608:7k+Co6XbpAFm296/hjDNsSNMRR20SblaEtwyJHZxAvZjV5QEPo/Vj2iL:7VSbWFm2A5sSAR9k7wyHKDmko/BL
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
2b2cf69e9948a3323ec772826b58a0d3ce42515604630a1695924380997eff3c.exepid process 2208 2b2cf69e9948a3323ec772826b58a0d3ce42515604630a1695924380997eff3c.exe -
Processes:
resource yara_rule behavioral1/memory/2208-60-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2208-58-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2208-70-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2208-68-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2208-67-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2208-64-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2208-62-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2208-56-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2208-54-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2208-52-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2208-51-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2208-50-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
2b2cf69e9948a3323ec772826b58a0d3ce42515604630a1695924380997eff3c.exepid process 2208 2b2cf69e9948a3323ec772826b58a0d3ce42515604630a1695924380997eff3c.exe 2208 2b2cf69e9948a3323ec772826b58a0d3ce42515604630a1695924380997eff3c.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
2b2cf69e9948a3323ec772826b58a0d3ce42515604630a1695924380997eff3c.exepid process 2208 2b2cf69e9948a3323ec772826b58a0d3ce42515604630a1695924380997eff3c.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
2b2cf69e9948a3323ec772826b58a0d3ce42515604630a1695924380997eff3c.exepid process 2208 2b2cf69e9948a3323ec772826b58a0d3ce42515604630a1695924380997eff3c.exe 2208 2b2cf69e9948a3323ec772826b58a0d3ce42515604630a1695924380997eff3c.exe 2208 2b2cf69e9948a3323ec772826b58a0d3ce42515604630a1695924380997eff3c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b2cf69e9948a3323ec772826b58a0d3ce42515604630a1695924380997eff3c.exe"C:\Users\Admin\AppData\Local\Temp\2b2cf69e9948a3323ec772826b58a0d3ce42515604630a1695924380997eff3c.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\E2EECore.2.7.2.dllFilesize
8.4MB
MD58b6c94bbdbfb213e94a5dcb4fac28ce3
SHA1b56102ca4f03556f387f8b30e2b404efabe0cb65
SHA256982a177924762f270b36fe34c7d6847392b48ae53151dc2011078dceef487a53
SHA5129d6d63b5d8cf7a978d7e91126d7a343c2f7acd00022da9d692f63e50835fdd84a59a93328564f10622f2b1f6adfd7febdd98b8ddb294d0754ed45cc9c165d25a
-
memory/2208-1-0x0000000000280000-0x0000000000281000-memory.dmpFilesize
4KB
-
memory/2208-33-0x00000000002E0000-0x00000000002E1000-memory.dmpFilesize
4KB
-
memory/2208-60-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2208-35-0x00000000002E0000-0x00000000002E1000-memory.dmpFilesize
4KB
-
memory/2208-58-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2208-30-0x00000000002D0000-0x00000000002D1000-memory.dmpFilesize
4KB
-
memory/2208-28-0x00000000002D0000-0x00000000002D1000-memory.dmpFilesize
4KB
-
memory/2208-25-0x00000000002C0000-0x00000000002C1000-memory.dmpFilesize
4KB
-
memory/2208-23-0x00000000002C0000-0x00000000002C1000-memory.dmpFilesize
4KB
-
memory/2208-20-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB
-
memory/2208-18-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB
-
memory/2208-16-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB
-
memory/2208-15-0x00000000002A0000-0x00000000002A1000-memory.dmpFilesize
4KB
-
memory/2208-13-0x00000000002A0000-0x00000000002A1000-memory.dmpFilesize
4KB
-
memory/2208-11-0x00000000002A0000-0x00000000002A1000-memory.dmpFilesize
4KB
-
memory/2208-70-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2208-8-0x0000000000290000-0x0000000000291000-memory.dmpFilesize
4KB
-
memory/2208-44-0x0000000000400000-0x0000000001A7B000-memory.dmpFilesize
22.5MB
-
memory/2208-6-0x0000000000290000-0x0000000000291000-memory.dmpFilesize
4KB
-
memory/2208-45-0x0000000000400000-0x0000000001A7B000-memory.dmpFilesize
22.5MB
-
memory/2208-5-0x0000000000280000-0x0000000000281000-memory.dmpFilesize
4KB
-
memory/2208-3-0x0000000000280000-0x0000000000281000-memory.dmpFilesize
4KB
-
memory/2208-0-0x00000000007A0000-0x0000000000EEC000-memory.dmpFilesize
7.3MB
-
memory/2208-42-0x0000000000400000-0x0000000001A7B000-memory.dmpFilesize
22.5MB
-
memory/2208-38-0x0000000000330000-0x0000000000331000-memory.dmpFilesize
4KB
-
memory/2208-40-0x0000000000330000-0x0000000000331000-memory.dmpFilesize
4KB
-
memory/2208-10-0x0000000000290000-0x0000000000291000-memory.dmpFilesize
4KB
-
memory/2208-95-0x0000000000400000-0x0000000001A7B000-memory.dmpFilesize
22.5MB
-
memory/2208-68-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2208-67-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2208-96-0x0000000000400000-0x0000000001A7B000-memory.dmpFilesize
22.5MB
-
memory/2208-64-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2208-62-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2208-56-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2208-97-0x0000000000400000-0x0000000001A7B000-memory.dmpFilesize
22.5MB
-
memory/2208-54-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2208-52-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2208-51-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2208-50-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2208-98-0x0000000000400000-0x0000000001A7B000-memory.dmpFilesize
22.5MB
-
memory/2208-99-0x0000000000400000-0x0000000001A7B000-memory.dmpFilesize
22.5MB
-
memory/2208-100-0x0000000000400000-0x0000000001A7B000-memory.dmpFilesize
22.5MB
-
memory/2208-101-0x0000000000400000-0x0000000001A7B000-memory.dmpFilesize
22.5MB
-
memory/2208-102-0x0000000000400000-0x0000000001A7B000-memory.dmpFilesize
22.5MB
-
memory/2208-103-0x0000000000400000-0x0000000001A7B000-memory.dmpFilesize
22.5MB
-
memory/2208-104-0x00000000007A0000-0x0000000000EEC000-memory.dmpFilesize
7.3MB
-
memory/2208-105-0x0000000000400000-0x0000000001A7B000-memory.dmpFilesize
22.5MB
-
memory/2208-106-0x0000000000400000-0x0000000001A7B000-memory.dmpFilesize
22.5MB
-
memory/2208-107-0x0000000000400000-0x0000000001A7B000-memory.dmpFilesize
22.5MB
-
memory/2208-108-0x0000000000400000-0x0000000001A7B000-memory.dmpFilesize
22.5MB