Analysis
-
max time kernel
63s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-07-2022 11:46
Static task
static1
Behavioral task
behavioral1
Sample
ddc3aa16d9b852405a0cc74241441c766142e740ccc772d26cefbe97eee225c1.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ddc3aa16d9b852405a0cc74241441c766142e740ccc772d26cefbe97eee225c1.exe
Resource
win10v2004-20220414-en
General
-
Target
ddc3aa16d9b852405a0cc74241441c766142e740ccc772d26cefbe97eee225c1.exe
-
Size
632KB
-
MD5
457d3dba54b93e93128b3a252c0f8051
-
SHA1
005df6bccc65bde25a4eaa64fda0744226bfa9ca
-
SHA256
ddc3aa16d9b852405a0cc74241441c766142e740ccc772d26cefbe97eee225c1
-
SHA512
8faf1785bab253e606bde621f7d1b925614ca95a7a80f1dedef48ae49bb150fa803213952cbff4a9eb7b2e9f32398fcc45aecd773a258d0d40e85ed9bb224499
Malware Config
Signatures
-
Processes:
resource yara_rule \Program Files\Common Files\Microsoft Shared\MSInfo\rejoice45.exe aspack_v212_v242 \Program Files\Common Files\Microsoft Shared\MSInfo\rejoice45.exe aspack_v212_v242 C:\Program Files\Common Files\Microsoft Shared\MSInfo\rejoice45.exe aspack_v212_v242 C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice45.exe aspack_v212_v242 -
Executes dropped EXE 1 IoCs
Processes:
rejoice45.exepid process 1476 rejoice45.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 572 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
ddc3aa16d9b852405a0cc74241441c766142e740ccc772d26cefbe97eee225c1.exepid process 836 ddc3aa16d9b852405a0cc74241441c766142e740ccc772d26cefbe97eee225c1.exe 836 ddc3aa16d9b852405a0cc74241441c766142e740ccc772d26cefbe97eee225c1.exe -
Drops file in System32 directory 2 IoCs
Processes:
rejoice45.exedescription ioc process File created C:\Windows\SysWOW64\_rejoice45.exe rejoice45.exe File opened for modification C:\Windows\SysWOW64\_rejoice45.exe rejoice45.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rejoice45.exedescription pid process target process PID 1476 set thread context of 1620 1476 rejoice45.exe calc.exe -
Drops file in Program Files directory 3 IoCs
Processes:
ddc3aa16d9b852405a0cc74241441c766142e740ccc772d26cefbe97eee225c1.exedescription ioc process File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice45.exe ddc3aa16d9b852405a0cc74241441c766142e740ccc772d26cefbe97eee225c1.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\Delet.bat ddc3aa16d9b852405a0cc74241441c766142e740ccc772d26cefbe97eee225c1.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice45.exe ddc3aa16d9b852405a0cc74241441c766142e740ccc772d26cefbe97eee225c1.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1368 1476 WerFault.exe rejoice45.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
ddc3aa16d9b852405a0cc74241441c766142e740ccc772d26cefbe97eee225c1.exerejoice45.exedescription pid process target process PID 836 wrote to memory of 1476 836 ddc3aa16d9b852405a0cc74241441c766142e740ccc772d26cefbe97eee225c1.exe rejoice45.exe PID 836 wrote to memory of 1476 836 ddc3aa16d9b852405a0cc74241441c766142e740ccc772d26cefbe97eee225c1.exe rejoice45.exe PID 836 wrote to memory of 1476 836 ddc3aa16d9b852405a0cc74241441c766142e740ccc772d26cefbe97eee225c1.exe rejoice45.exe PID 836 wrote to memory of 1476 836 ddc3aa16d9b852405a0cc74241441c766142e740ccc772d26cefbe97eee225c1.exe rejoice45.exe PID 1476 wrote to memory of 1620 1476 rejoice45.exe calc.exe PID 1476 wrote to memory of 1620 1476 rejoice45.exe calc.exe PID 1476 wrote to memory of 1620 1476 rejoice45.exe calc.exe PID 1476 wrote to memory of 1620 1476 rejoice45.exe calc.exe PID 1476 wrote to memory of 1620 1476 rejoice45.exe calc.exe PID 1476 wrote to memory of 1620 1476 rejoice45.exe calc.exe PID 1476 wrote to memory of 944 1476 rejoice45.exe IEXPLORE.EXE PID 1476 wrote to memory of 944 1476 rejoice45.exe IEXPLORE.EXE PID 1476 wrote to memory of 944 1476 rejoice45.exe IEXPLORE.EXE PID 1476 wrote to memory of 944 1476 rejoice45.exe IEXPLORE.EXE PID 1476 wrote to memory of 1368 1476 rejoice45.exe WerFault.exe PID 1476 wrote to memory of 1368 1476 rejoice45.exe WerFault.exe PID 1476 wrote to memory of 1368 1476 rejoice45.exe WerFault.exe PID 1476 wrote to memory of 1368 1476 rejoice45.exe WerFault.exe PID 836 wrote to memory of 572 836 ddc3aa16d9b852405a0cc74241441c766142e740ccc772d26cefbe97eee225c1.exe cmd.exe PID 836 wrote to memory of 572 836 ddc3aa16d9b852405a0cc74241441c766142e740ccc772d26cefbe97eee225c1.exe cmd.exe PID 836 wrote to memory of 572 836 ddc3aa16d9b852405a0cc74241441c766142e740ccc772d26cefbe97eee225c1.exe cmd.exe PID 836 wrote to memory of 572 836 ddc3aa16d9b852405a0cc74241441c766142e740ccc772d26cefbe97eee225c1.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ddc3aa16d9b852405a0cc74241441c766142e740ccc772d26cefbe97eee225c1.exe"C:\Users\Admin\AppData\Local\Temp\ddc3aa16d9b852405a0cc74241441c766142e740ccc772d26cefbe97eee225c1.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice45.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice45.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵
-
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1476 -s 3163⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\Delet.bat""2⤵
- Deletes itself
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Common Files\Microsoft Shared\MSINFO\Delet.batFilesize
248B
MD549712cc8534d6e855804749d6113e545
SHA18fd9618f9e770f5b59c6d43763bed198effc8cb1
SHA256b90b1b9cdb5c9f912dddabc383aa6b2cd943fab226fe19b6d908d5bb223627a4
SHA5124fd0439860e68b5d7331b553f962f3ee1cbc372ece9b7c982f6966985bc5c7108e97b55b670d63965e5cc27e5edca240f4e2671afbdad1c3df06180f5a81e5b7
-
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice45.exeFilesize
632KB
MD5457d3dba54b93e93128b3a252c0f8051
SHA1005df6bccc65bde25a4eaa64fda0744226bfa9ca
SHA256ddc3aa16d9b852405a0cc74241441c766142e740ccc772d26cefbe97eee225c1
SHA5128faf1785bab253e606bde621f7d1b925614ca95a7a80f1dedef48ae49bb150fa803213952cbff4a9eb7b2e9f32398fcc45aecd773a258d0d40e85ed9bb224499
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\rejoice45.exeFilesize
632KB
MD5457d3dba54b93e93128b3a252c0f8051
SHA1005df6bccc65bde25a4eaa64fda0744226bfa9ca
SHA256ddc3aa16d9b852405a0cc74241441c766142e740ccc772d26cefbe97eee225c1
SHA5128faf1785bab253e606bde621f7d1b925614ca95a7a80f1dedef48ae49bb150fa803213952cbff4a9eb7b2e9f32398fcc45aecd773a258d0d40e85ed9bb224499
-
\Program Files\Common Files\Microsoft Shared\MSInfo\rejoice45.exeFilesize
632KB
MD5457d3dba54b93e93128b3a252c0f8051
SHA1005df6bccc65bde25a4eaa64fda0744226bfa9ca
SHA256ddc3aa16d9b852405a0cc74241441c766142e740ccc772d26cefbe97eee225c1
SHA5128faf1785bab253e606bde621f7d1b925614ca95a7a80f1dedef48ae49bb150fa803213952cbff4a9eb7b2e9f32398fcc45aecd773a258d0d40e85ed9bb224499
-
\Program Files\Common Files\Microsoft Shared\MSInfo\rejoice45.exeFilesize
632KB
MD5457d3dba54b93e93128b3a252c0f8051
SHA1005df6bccc65bde25a4eaa64fda0744226bfa9ca
SHA256ddc3aa16d9b852405a0cc74241441c766142e740ccc772d26cefbe97eee225c1
SHA5128faf1785bab253e606bde621f7d1b925614ca95a7a80f1dedef48ae49bb150fa803213952cbff4a9eb7b2e9f32398fcc45aecd773a258d0d40e85ed9bb224499
-
memory/572-73-0x0000000000000000-mapping.dmp
-
memory/836-55-0x0000000001D30000-0x0000000001D84000-memory.dmpFilesize
336KB
-
memory/836-56-0x0000000003360000-0x0000000003460000-memory.dmpFilesize
1024KB
-
memory/836-57-0x0000000001D30000-0x0000000001D84000-memory.dmpFilesize
336KB
-
memory/836-74-0x0000000001D30000-0x0000000001D84000-memory.dmpFilesize
336KB
-
memory/836-54-0x0000000075721000-0x0000000075723000-memory.dmpFilesize
8KB
-
memory/1368-70-0x0000000000000000-mapping.dmp
-
memory/1476-65-0x0000000003360000-0x0000000003460000-memory.dmpFilesize
1024KB
-
memory/1476-71-0x0000000000310000-0x0000000000364000-memory.dmpFilesize
336KB
-
memory/1476-72-0x0000000003360000-0x0000000003460000-memory.dmpFilesize
1024KB
-
memory/1476-64-0x0000000000310000-0x0000000000364000-memory.dmpFilesize
336KB
-
memory/1476-60-0x0000000000000000-mapping.dmp
-
memory/1620-69-0x0000000000512001-mapping.dmp
-
memory/1620-68-0x0000000000400000-0x0000000000515000-memory.dmpFilesize
1.1MB
-
memory/1620-66-0x0000000000400000-0x0000000000515000-memory.dmpFilesize
1.1MB