Analysis
-
max time kernel
69s -
max time network
115s -
platform
windows10_x64 -
resource
win10 -
submitted
09/07/2020, 08:24
Static task
static1
Behavioral task
behavioral1
Sample
7e17e9de1f6643f57b6cda4a921b025a9caf5689728b0af2f653887f41e2c318.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
7e17e9de1f6643f57b6cda4a921b025a9caf5689728b0af2f653887f41e2c318.exe
Resource
win10
General
-
Target
7e17e9de1f6643f57b6cda4a921b025a9caf5689728b0af2f653887f41e2c318.exe
-
Size
3.9MB
-
MD5
d9a3d088b4cbcbfb2230da604571868c
-
SHA1
bf01b74eb384cb5b7817cb891ccf96c883b98988
-
SHA256
7e17e9de1f6643f57b6cda4a921b025a9caf5689728b0af2f653887f41e2c318
-
SHA512
9a70a94ebb76f25724bb5653db9e9d76d6f8800bee053379e919d42d6df363df9963f1891b45756e19ab77030031ffb2bc0eb9434fa0c51db50a7f7418808ee2
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3832 wrote to memory of 3032 3832 7e17e9de1f6643f57b6cda4a921b025a9caf5689728b0af2f653887f41e2c318.exe 67 PID 3832 wrote to memory of 3032 3832 7e17e9de1f6643f57b6cda4a921b025a9caf5689728b0af2f653887f41e2c318.exe 67 PID 3832 wrote to memory of 3032 3832 7e17e9de1f6643f57b6cda4a921b025a9caf5689728b0af2f653887f41e2c318.exe 67 PID 3832 wrote to memory of 3904 3832 7e17e9de1f6643f57b6cda4a921b025a9caf5689728b0af2f653887f41e2c318.exe 68 PID 3832 wrote to memory of 3904 3832 7e17e9de1f6643f57b6cda4a921b025a9caf5689728b0af2f653887f41e2c318.exe 68 PID 3832 wrote to memory of 3904 3832 7e17e9de1f6643f57b6cda4a921b025a9caf5689728b0af2f653887f41e2c318.exe 68 -
Executes dropped EXE 2 IoCs
pid Process 3032 jfiag_gg.exe 3904 jfiag_gg.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3904 jfiag_gg.exe 3904 jfiag_gg.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run entry to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\kissq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kissq.exe" 7e17e9de1f6643f57b6cda4a921b025a9caf5689728b0af2f653887f41e2c318.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e17e9de1f6643f57b6cda4a921b025a9caf5689728b0af2f653887f41e2c318.exe"C:\Users\Admin\AppData\Local\Temp\7e17e9de1f6643f57b6cda4a921b025a9caf5689728b0af2f653887f41e2c318.exe"1⤵
- Suspicious use of WriteProcessMemory
- Adds Run entry to start application
PID:3832 -
C:\Users\Admin\AppData\Local\Temp\jfiag_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fjgha23_fa.txt2⤵
- Executes dropped EXE
PID:3032
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fjgha23_fa.txt2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3904
-