Analysis
-
max time kernel
102s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
09-03-2022 07:48
Behavioral task
behavioral1
Sample
8946892a1354aebdd14040128348bd3905c35b40c713e0cf9bdc7426ae24fe69.exe
Resource
win7-20220223-en
General
-
Target
8946892a1354aebdd14040128348bd3905c35b40c713e0cf9bdc7426ae24fe69.exe
-
Size
241KB
-
MD5
bf31b7ccb10573e3a6f84bac0cbeeae1
-
SHA1
f5d97b3ff5b7fdb9ca25ee046c901617a6be3878
-
SHA256
8946892a1354aebdd14040128348bd3905c35b40c713e0cf9bdc7426ae24fe69
-
SHA512
c4c342fb8cdf78c1962a25b510e02afde88890486b5879a3891d8262b1b45bd12de810ed5a258943bc556b184097569a81591cca52f7019927cce854f7d3a1bc
Malware Config
Extracted
jester
FikusCode
http://jesterdcuxzbey4xvlwwheoecpltru5be2mzuk4w7a7nrhckdjjhrbyd.onion/report/FikusCode
https://api.anonfiles.com/upload?token=d26d620842507144
46378331-3729-449c-9a03-94f385d10a9c
-
license_key
D1F0DE359CBD562CCF9326AEEEA8E64E
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
MusNotifyIcon.exedescription ioc process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotifyIcon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotifyIcon.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
8946892a1354aebdd14040128348bd3905c35b40c713e0cf9bdc7426ae24fe69.exedescription pid process Token: SeDebugPrivilege 768 8946892a1354aebdd14040128348bd3905c35b40c713e0cf9bdc7426ae24fe69.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8946892a1354aebdd14040128348bd3905c35b40c713e0cf9bdc7426ae24fe69.exe"C:\Users\Admin\AppData\Local\Temp\8946892a1354aebdd14040128348bd3905c35b40c713e0cf9bdc7426ae24fe69.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:768
-
C:\Windows\system32\MusNotifyIcon.exe%systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 01⤵
- Checks processor information in registry
PID:880