Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
23/01/2022, 16:46
Static task
static1
Behavioral task
behavioral1
Sample
msg.exe
Resource
win7-en-20211208
0 signatures
0 seconds
General
-
Target
msg.exe
-
Size
392KB
-
MD5
d90d0f4d6dad402b5d025987030cc87c
-
SHA1
fad66bdf5c5dc2c050cbc574832c6995dba086a0
-
SHA256
1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c
-
SHA512
c2faeacfd588585633630ad710f443a72c7617c2d5e37dbfe43570e6ac5904e4b81eb682356a48a93bb794ef5e9d8ad0d673966d57798079b4de62ea61241024
Malware Config
Signatures
-
Detection for the linux version of Sysjoker cross-platform backdoor 2 IoCs
resource yara_rule behavioral2/files/0x000300000001525a-138.dat family_linux_sysjoker behavioral2/files/0x000300000001525a-139.dat family_linux_sysjoker -
Detection for the mac version of Sysjoker cross-platform backdoor 2 IoCs
resource yara_rule behavioral2/files/0x000300000001525a-138.dat family_macos_sysjoker behavioral2/files/0x000300000001525a-139.dat family_macos_sysjoker -
Detection for the windows version of Sysjoker cross-platform backdoor 2 IoCs
resource yara_rule behavioral2/files/0x000300000001525a-138.dat family_sysjoker behavioral2/files/0x000300000001525a-139.dat family_sysjoker -
Executes dropped EXE 1 IoCs
pid Process 940 igfxCUIService.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1748 powershell.exe 1748 powershell.exe 1748 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1748 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2644 wrote to memory of 1748 2644 msg.exe 71 PID 2644 wrote to memory of 1748 2644 msg.exe 71 PID 2644 wrote to memory of 1748 2644 msg.exe 71 PID 2644 wrote to memory of 940 2644 msg.exe 73 PID 2644 wrote to memory of 940 2644 msg.exe 73 PID 2644 wrote to memory of 940 2644 msg.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\msg.exe"C:\Users\Admin\AppData\Local\Temp\msg.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" copy 'C:\Users\Admin\AppData\Local\Temp\msg.exe' 'C:\ProgramData\SystemData\igfxCUIService.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1748
-
-
C:\ProgramData\SystemData\igfxCUIService.exe"C:\ProgramData\SystemData\igfxCUIService.exe"2⤵
- Executes dropped EXE
PID:940
-