Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
26-06-2020 08:43
Static task
static1
Behavioral task
behavioral1
Sample
JEsNEuI.dll
Resource
win7
windows7_x64
0 signatures
0 seconds
General
-
Target
JEsNEuI.dll
-
Size
356KB
-
MD5
9eea7a0571baf33fa6877e8f8ebb3ad7
-
SHA1
9a7738f3f73d78d9fe18ba5401081d27f4222c8d
-
SHA256
121d7fc3a0a43a6ef4b73f564175b92727281155b221ff6f34c00d73438b679e
-
SHA512
90b6440f8c0fd2946eb5e47882aaf6b608fc900e9684daf4da74579d8863e83d26be7d27e2e074a98fdf631f2e9d44bc3e79a619ef88db009ade73516afa3e94
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 1648 wrote to memory of 1828 1648 rundll32.exe 69 PID 1648 wrote to memory of 1828 1648 rundll32.exe 69 PID 1648 wrote to memory of 1828 1648 rundll32.exe 69 PID 1828 wrote to memory of 2800 1828 rundll32.exe 73 PID 1828 wrote to memory of 2800 1828 rundll32.exe 73 PID 1828 wrote to memory of 2800 1828 rundll32.exe 73 PID 1828 wrote to memory of 2800 1828 rundll32.exe 73 PID 1828 wrote to memory of 2800 1828 rundll32.exe 73 PID 2800 wrote to memory of 4024 2800 msiexec.exe 74 PID 2800 wrote to memory of 4024 2800 msiexec.exe 74 PID 2800 wrote to memory of 4024 2800 msiexec.exe 74 PID 4024 wrote to memory of 492 4024 cmd.exe 76 PID 4024 wrote to memory of 492 4024 cmd.exe 76 PID 4024 wrote to memory of 492 4024 cmd.exe 76 PID 2800 wrote to memory of 2292 2800 msiexec.exe 77 PID 2800 wrote to memory of 2292 2800 msiexec.exe 77 PID 2800 wrote to memory of 2292 2800 msiexec.exe 77 PID 2292 wrote to memory of 1456 2292 cmd.exe 79 PID 2292 wrote to memory of 1456 2292 cmd.exe 79 PID 2292 wrote to memory of 1456 2292 cmd.exe 79 PID 1456 wrote to memory of 356 1456 net.exe 80 PID 1456 wrote to memory of 356 1456 net.exe 80 PID 1456 wrote to memory of 356 1456 net.exe 80 PID 2800 wrote to memory of 3908 2800 msiexec.exe 81 PID 2800 wrote to memory of 3908 2800 msiexec.exe 81 PID 2800 wrote to memory of 3908 2800 msiexec.exe 81 PID 3908 wrote to memory of 1988 3908 cmd.exe 83 PID 3908 wrote to memory of 1988 3908 cmd.exe 83 PID 3908 wrote to memory of 1988 3908 cmd.exe 83 PID 2800 wrote to memory of 3760 2800 msiexec.exe 84 PID 2800 wrote to memory of 3760 2800 msiexec.exe 84 PID 2800 wrote to memory of 3760 2800 msiexec.exe 84 PID 3760 wrote to memory of 2304 3760 cmd.exe 86 PID 3760 wrote to memory of 2304 3760 cmd.exe 86 PID 3760 wrote to memory of 2304 3760 cmd.exe 86 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1828 set thread context of 2800 1828 rundll32.exe 73 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 2800 msiexec.exe Token: SeSecurityPrivilege 2800 msiexec.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2800 msiexec.exe 2800 msiexec.exe 2800 msiexec.exe 2800 msiexec.exe 2800 msiexec.exe 2800 msiexec.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Runs net.exe
-
Blacklisted process makes network request 18 IoCs
flow pid Process 8 2800 msiexec.exe 9 2800 msiexec.exe 10 2800 msiexec.exe 11 2800 msiexec.exe 12 2800 msiexec.exe 13 2800 msiexec.exe 14 2800 msiexec.exe 15 2800 msiexec.exe 16 2800 msiexec.exe 17 2800 msiexec.exe 18 2800 msiexec.exe 19 2800 msiexec.exe 20 2800 msiexec.exe 21 2800 msiexec.exe 22 2800 msiexec.exe 23 2800 msiexec.exe 24 2800 msiexec.exe 25 2800 msiexec.exe -
Discovers systems in the same network 1 TTPs 2 IoCs
pid Process 1988 net.exe 2304 net.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JEsNEuI.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JEsNEuI.dll,#12⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:1828 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Blacklisted process makes network request
PID:2800 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ipconfig /all4⤵
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /all5⤵PID:492
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net config workstation4⤵
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\net.exenet config workstation5⤵
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 config workstation6⤵PID:356
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net view /all4⤵
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\SysWOW64\net.exenet view /all5⤵
- Discovers systems in the same network
PID:1988
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net view /all /domain4⤵
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\SysWOW64\net.exenet view /all /domain5⤵
- Discovers systems in the same network
PID:2304
-
-
-
-