Resubmissions

19-06-2024 06:12

240619-gyadhsvhkh 10

16-09-2021 08:31

210916-keqg6scfa6 10

Analysis

  • max time kernel
    64s
  • max time network
    128s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    16-09-2021 08:31

General

  • Target

    Due-Diligence-Checklist-For-Oil-And-Gas-Properties.msi

Malware Config

Extracted

Family

jupyter

Version

SP-13

C2

http://45.42.201.248

Signatures

  • Jupyter Backdoor/Client Payload 1 IoCs
  • Jupyter, SolarMarker

    Jupyter is a backdoor and infostealer first seen in mid 2020.

  • Blocklisted process makes network request 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Due-Diligence-Checklist-For-Oil-And-Gas-Properties.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1832
    • C:\Users\Admin\AppData\Local\Temp\MSI502A.tmp
      "C:\Users\Admin\AppData\Local\Temp\MSI502A.tmp"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Enumerates system info in registry
      PID:1408
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2280
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding E3DA67FD23A1075CF4C32F37B6E2D57C C
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:920
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss50B9.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msi5096.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scr5097.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scr50A8.txt" -propSep " :<->: " -testPrefix "_testValue."
        3⤵
        • Blocklisted process makes network request
        • Drops startup file
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        PID:1280

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1280-136-0x0000000007BC0000-0x0000000007BC1000-memory.dmp

    Filesize

    4KB

  • memory/1280-139-0x00000000080A0000-0x00000000080A1000-memory.dmp

    Filesize

    4KB

  • memory/1280-133-0x0000000004822000-0x0000000004823000-memory.dmp

    Filesize

    4KB

  • memory/1280-132-0x0000000004820000-0x0000000004821000-memory.dmp

    Filesize

    4KB

  • memory/1280-134-0x00000000071E0000-0x00000000071E1000-memory.dmp

    Filesize

    4KB

  • memory/1280-135-0x0000000007970000-0x0000000007971000-memory.dmp

    Filesize

    4KB

  • memory/1280-130-0x0000000004860000-0x0000000004861000-memory.dmp

    Filesize

    4KB

  • memory/1280-137-0x0000000007C30000-0x0000000007C31000-memory.dmp

    Filesize

    4KB

  • memory/1280-138-0x0000000008040000-0x0000000008041000-memory.dmp

    Filesize

    4KB

  • memory/1280-131-0x0000000007290000-0x0000000007291000-memory.dmp

    Filesize

    4KB

  • memory/1280-140-0x0000000008320000-0x0000000008321000-memory.dmp

    Filesize

    4KB

  • memory/1280-1911-0x00000000096A0000-0x00000000096A8000-memory.dmp

    Filesize

    32KB

  • memory/1280-146-0x00000000093E0000-0x00000000093E1000-memory.dmp

    Filesize

    4KB

  • memory/1280-147-0x0000000009060000-0x0000000009061000-memory.dmp

    Filesize

    4KB

  • memory/1280-148-0x00000000090D0000-0x00000000090D1000-memory.dmp

    Filesize

    4KB

  • memory/1280-149-0x0000000009980000-0x0000000009981000-memory.dmp

    Filesize

    4KB

  • memory/1280-154-0x000000000A500000-0x000000000A501000-memory.dmp

    Filesize

    4KB

  • memory/1280-186-0x0000000004823000-0x0000000004824000-memory.dmp

    Filesize

    4KB