Analysis
-
max time kernel
88s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
01-07-2022 13:43
Static task
static1
Behavioral task
behavioral1
Sample
3e02aacab65bb5f72daf6590d702077e564302eb47ea89e618274068a471ee15.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3e02aacab65bb5f72daf6590d702077e564302eb47ea89e618274068a471ee15.exe
Resource
win10v2004-20220414-en
General
-
Target
3e02aacab65bb5f72daf6590d702077e564302eb47ea89e618274068a471ee15.exe
-
Size
470KB
-
MD5
6a5a9f569c4636b51bd64355b7969b16
-
SHA1
bb366442fb89833c9a5e0446f23d2cb27e740613
-
SHA256
3e02aacab65bb5f72daf6590d702077e564302eb47ea89e618274068a471ee15
-
SHA512
3c04c8eb6f5c30bdddb43afb2b7a98d1bfd15c849319999a90c23fdd6ff5cc1222920d3956071650ddc62c2a5f9bd8aeeb5f5edd256546e9643d432cd69a7382
Malware Config
Signatures
-
Modifies boot configuration data using bcdedit 1 TTPs 10 IoCs
Processes:
bcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exepid Process 588 bcdedit.exe 1420 bcdedit.exe 1780 bcdedit.exe 1844 bcdedit.exe 2028 bcdedit.exe 1288 bcdedit.exe 1792 bcdedit.exe 532 bcdedit.exe 1772 bcdedit.exe 1648 bcdedit.exe -
Drops file in Drivers directory 1 IoCs
Processes:
jodie.exedescription ioc Process File created C:\Windows\system32\drivers\6c0188.sys jodie.exe -
Executes dropped EXE 1 IoCs
Processes:
jodie.exepid Process 1480 jodie.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 964 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
3e02aacab65bb5f72daf6590d702077e564302eb47ea89e618274068a471ee15.exepid Process 1764 3e02aacab65bb5f72daf6590d702077e564302eb47ea89e618274068a471ee15.exe 1764 3e02aacab65bb5f72daf6590d702077e564302eb47ea89e618274068a471ee15.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
jodie.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run jodie.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\Jodie = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Ytoba\\jodie.exe" jodie.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
3e02aacab65bb5f72daf6590d702077e564302eb47ea89e618274068a471ee15.exedescription pid Process procid_target PID 1764 set thread context of 964 1764 3e02aacab65bb5f72daf6590d702077e564302eb47ea89e618274068a471ee15.exe 49 -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
3e02aacab65bb5f72daf6590d702077e564302eb47ea89e618274068a471ee15.exejodie.exepid Process 1764 3e02aacab65bb5f72daf6590d702077e564302eb47ea89e618274068a471ee15.exe 1480 jodie.exe 1480 jodie.exe 1480 jodie.exe 1480 jodie.exe 1480 jodie.exe 1480 jodie.exe 1480 jodie.exe 1480 jodie.exe 1480 jodie.exe 1480 jodie.exe 1480 jodie.exe 1480 jodie.exe 1480 jodie.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid Process 464 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
jodie.exedescription pid Process Token: SeShutdownPrivilege 1480 jodie.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3e02aacab65bb5f72daf6590d702077e564302eb47ea89e618274068a471ee15.exejodie.exedescription pid Process procid_target PID 1764 wrote to memory of 1480 1764 3e02aacab65bb5f72daf6590d702077e564302eb47ea89e618274068a471ee15.exe 28 PID 1764 wrote to memory of 1480 1764 3e02aacab65bb5f72daf6590d702077e564302eb47ea89e618274068a471ee15.exe 28 PID 1764 wrote to memory of 1480 1764 3e02aacab65bb5f72daf6590d702077e564302eb47ea89e618274068a471ee15.exe 28 PID 1764 wrote to memory of 1480 1764 3e02aacab65bb5f72daf6590d702077e564302eb47ea89e618274068a471ee15.exe 28 PID 1480 wrote to memory of 588 1480 jodie.exe 29 PID 1480 wrote to memory of 588 1480 jodie.exe 29 PID 1480 wrote to memory of 588 1480 jodie.exe 29 PID 1480 wrote to memory of 588 1480 jodie.exe 29 PID 1480 wrote to memory of 1420 1480 jodie.exe 30 PID 1480 wrote to memory of 1420 1480 jodie.exe 30 PID 1480 wrote to memory of 1420 1480 jodie.exe 30 PID 1480 wrote to memory of 1420 1480 jodie.exe 30 PID 1480 wrote to memory of 1288 1480 jodie.exe 38 PID 1480 wrote to memory of 1288 1480 jodie.exe 38 PID 1480 wrote to memory of 1288 1480 jodie.exe 38 PID 1480 wrote to memory of 1288 1480 jodie.exe 38 PID 1480 wrote to memory of 2028 1480 jodie.exe 36 PID 1480 wrote to memory of 2028 1480 jodie.exe 36 PID 1480 wrote to memory of 2028 1480 jodie.exe 36 PID 1480 wrote to memory of 2028 1480 jodie.exe 36 PID 1480 wrote to memory of 1844 1480 jodie.exe 35 PID 1480 wrote to memory of 1844 1480 jodie.exe 35 PID 1480 wrote to memory of 1844 1480 jodie.exe 35 PID 1480 wrote to memory of 1844 1480 jodie.exe 35 PID 1480 wrote to memory of 1780 1480 jodie.exe 33 PID 1480 wrote to memory of 1780 1480 jodie.exe 33 PID 1480 wrote to memory of 1780 1480 jodie.exe 33 PID 1480 wrote to memory of 1780 1480 jodie.exe 33 PID 1480 wrote to memory of 1792 1480 jodie.exe 39 PID 1480 wrote to memory of 1792 1480 jodie.exe 39 PID 1480 wrote to memory of 1792 1480 jodie.exe 39 PID 1480 wrote to memory of 1792 1480 jodie.exe 39 PID 1480 wrote to memory of 1772 1480 jodie.exe 44 PID 1480 wrote to memory of 1772 1480 jodie.exe 44 PID 1480 wrote to memory of 1772 1480 jodie.exe 44 PID 1480 wrote to memory of 1772 1480 jodie.exe 44 PID 1480 wrote to memory of 532 1480 jodie.exe 41 PID 1480 wrote to memory of 532 1480 jodie.exe 41 PID 1480 wrote to memory of 532 1480 jodie.exe 41 PID 1480 wrote to memory of 532 1480 jodie.exe 41 PID 1480 wrote to memory of 1648 1480 jodie.exe 46 PID 1480 wrote to memory of 1648 1480 jodie.exe 46 PID 1480 wrote to memory of 1648 1480 jodie.exe 46 PID 1480 wrote to memory of 1648 1480 jodie.exe 46 PID 1480 wrote to memory of 1144 1480 jodie.exe 15 PID 1480 wrote to memory of 1144 1480 jodie.exe 15 PID 1480 wrote to memory of 1144 1480 jodie.exe 15 PID 1480 wrote to memory of 1144 1480 jodie.exe 15 PID 1480 wrote to memory of 1144 1480 jodie.exe 15 PID 1480 wrote to memory of 1208 1480 jodie.exe 14 PID 1480 wrote to memory of 1208 1480 jodie.exe 14 PID 1480 wrote to memory of 1208 1480 jodie.exe 14 PID 1480 wrote to memory of 1208 1480 jodie.exe 14 PID 1480 wrote to memory of 1208 1480 jodie.exe 14 PID 1480 wrote to memory of 1264 1480 jodie.exe 13 PID 1480 wrote to memory of 1264 1480 jodie.exe 13 PID 1480 wrote to memory of 1264 1480 jodie.exe 13 PID 1480 wrote to memory of 1264 1480 jodie.exe 13 PID 1480 wrote to memory of 1264 1480 jodie.exe 13 PID 1480 wrote to memory of 1764 1480 jodie.exe 11 PID 1480 wrote to memory of 1764 1480 jodie.exe 11 PID 1480 wrote to memory of 1764 1480 jodie.exe 11 PID 1480 wrote to memory of 1764 1480 jodie.exe 11 PID 1480 wrote to memory of 1764 1480 jodie.exe 11
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e02aacab65bb5f72daf6590d702077e564302eb47ea89e618274068a471ee15.exe"C:\Users\Admin\AppData\Local\Temp\3e02aacab65bb5f72daf6590d702077e564302eb47ea89e618274068a471ee15.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\Ytoba\jodie.exe"C:\Users\Admin\AppData\Local\Temp\Ytoba\jodie.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON3⤵
- Modifies boot configuration data using bcdedit
PID:588
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON3⤵
- Modifies boot configuration data using bcdedit
PID:1420
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON3⤵
- Modifies boot configuration data using bcdedit
PID:1780
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON3⤵
- Modifies boot configuration data using bcdedit
PID:1844
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON3⤵
- Modifies boot configuration data using bcdedit
PID:2028
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON3⤵
- Modifies boot configuration data using bcdedit
PID:1288
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON3⤵
- Modifies boot configuration data using bcdedit
PID:1792
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON3⤵
- Modifies boot configuration data using bcdedit
PID:532
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON3⤵
- Modifies boot configuration data using bcdedit
PID:1772
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON3⤵
- Modifies boot configuration data using bcdedit
PID:1648
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\CFL1167.bat"2⤵
- Deletes itself
PID:964
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1264
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1208
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1144
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1608
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1844
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
276B
MD5a60d7bec063d60ac114835f3275673e3
SHA10aa62dc536ee2121c13ac8e3a7de2ba2c6dab50f
SHA256361cd60240b91241807dd17cdc100dd1fe28c834de68c0831dbe3cb061fb8b3c
SHA512d573261f763e211c97438debe64e90e12f3858a9edc1ffad297599d67a7e2c50599c9e4cefc09569fc7de48677e7e98a43a6b55fc6b9840499d6b86f90da86c0
-
Filesize
470KB
MD5f9df5abe5594ac31d5ff7608ea4f6191
SHA139d8f440dbf7c13d21f5b27f8fc6b9fc0e6c779d
SHA256baced09992d39d9b964b83101a995a719276910892e8b5680724d9252528f78b
SHA5122a0337f0aa98825b35be3ad818a606a7407e24f4ce539e73acbeed72b5260cd46feb663ed81c712b49d2faaa856bfcad76c44c4b6a41ea05d46d187e2626b6bb
-
Filesize
470KB
MD5f9df5abe5594ac31d5ff7608ea4f6191
SHA139d8f440dbf7c13d21f5b27f8fc6b9fc0e6c779d
SHA256baced09992d39d9b964b83101a995a719276910892e8b5680724d9252528f78b
SHA5122a0337f0aa98825b35be3ad818a606a7407e24f4ce539e73acbeed72b5260cd46feb663ed81c712b49d2faaa856bfcad76c44c4b6a41ea05d46d187e2626b6bb
-
Filesize
470KB
MD5f9df5abe5594ac31d5ff7608ea4f6191
SHA139d8f440dbf7c13d21f5b27f8fc6b9fc0e6c779d
SHA256baced09992d39d9b964b83101a995a719276910892e8b5680724d9252528f78b
SHA5122a0337f0aa98825b35be3ad818a606a7407e24f4ce539e73acbeed72b5260cd46feb663ed81c712b49d2faaa856bfcad76c44c4b6a41ea05d46d187e2626b6bb
-
Filesize
470KB
MD5f9df5abe5594ac31d5ff7608ea4f6191
SHA139d8f440dbf7c13d21f5b27f8fc6b9fc0e6c779d
SHA256baced09992d39d9b964b83101a995a719276910892e8b5680724d9252528f78b
SHA5122a0337f0aa98825b35be3ad818a606a7407e24f4ce539e73acbeed72b5260cd46feb663ed81c712b49d2faaa856bfcad76c44c4b6a41ea05d46d187e2626b6bb