Analysis
-
max time kernel
56s -
max time network
68s -
platform
windows7_x64 -
resource
win7 -
submitted
09/07/2020, 08:24
Static task
static1
Behavioral task
behavioral1
Sample
jooyu.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
jooyu.exe
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
jooyu.exe
-
Size
3.6MB
-
MD5
37d5c635f8d3299b0a83c0e4c372716c
-
SHA1
161e81a01668f556a41a1c3e1a301c734c784c08
-
SHA256
c25c1698395a2edd315158035660df240ab7e5cd43288fa87f207e07eec82d56
-
SHA512
18bf1be4b4c527e27452b71c34977f8f303a767a220640d8f134e9ef3fd8692307fbaa3931fbddf427ab33275bfaedac5cb471a12c4c74d35a725e7548727268
Score
8/10
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 1588 jooyu.exe 1588 jooyu.exe 1588 jooyu.exe 1588 jooyu.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1588 wrote to memory of 304 1588 jooyu.exe 24 PID 1588 wrote to memory of 304 1588 jooyu.exe 24 PID 1588 wrote to memory of 304 1588 jooyu.exe 24 PID 1588 wrote to memory of 304 1588 jooyu.exe 24 PID 1588 wrote to memory of 1516 1588 jooyu.exe 25 PID 1588 wrote to memory of 1516 1588 jooyu.exe 25 PID 1588 wrote to memory of 1516 1588 jooyu.exe 25 PID 1588 wrote to memory of 1516 1588 jooyu.exe 25 -
Executes dropped EXE 2 IoCs
pid Process 304 jfiag_gg.exe 1516 jfiag_gg.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run entry to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\kissq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kissq.exe" jooyu.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com
Processes
-
C:\Users\Admin\AppData\Local\Temp\jooyu.exe"C:\Users\Admin\AppData\Local\Temp\jooyu.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
- Adds Run entry to start application
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\jfiag_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fjgha23_fa.txt2⤵
- Executes dropped EXE
PID:304
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fjgha23_fa.txt2⤵
- Executes dropped EXE
PID:1516
-