Analysis
-
max time kernel
145s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
06-08-2022 07:42
Behavioral task
behavioral1
Sample
tmpscsa0hng.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
tmpscsa0hng.exe
Resource
win10v2004-20220721-en
General
-
Target
tmpscsa0hng.exe
-
Size
392KB
-
MD5
d90d0f4d6dad402b5d025987030cc87c
-
SHA1
fad66bdf5c5dc2c050cbc574832c6995dba086a0
-
SHA256
1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c
-
SHA512
c2faeacfd588585633630ad710f443a72c7617c2d5e37dbfe43570e6ac5904e4b81eb682356a48a93bb794ef5e9d8ad0d673966d57798079b4de62ea61241024
Malware Config
Signatures
-
Detection for the Linux version of Sysjoker cross-platform backdoor 4 IoCs
Processes:
resource yara_rule C:\ProgramData\SystemData\igfxCUIService.exe family_linux_sysjoker \ProgramData\SystemData\igfxCUIService.exe family_linux_sysjoker \ProgramData\SystemData\igfxCUIService.exe family_linux_sysjoker C:\ProgramData\SystemData\igfxCUIService.exe family_linux_sysjoker -
Detection for the macOS version of Sysjoker cross-platform backdoor 4 IoCs
Processes:
resource yara_rule C:\ProgramData\SystemData\igfxCUIService.exe family_macos_sysjoker \ProgramData\SystemData\igfxCUIService.exe family_macos_sysjoker \ProgramData\SystemData\igfxCUIService.exe family_macos_sysjoker C:\ProgramData\SystemData\igfxCUIService.exe family_macos_sysjoker -
Detection for the windows version of Sysjoker cross-platform backdoor 4 IoCs
Processes:
resource yara_rule C:\ProgramData\SystemData\igfxCUIService.exe family_sysjoker \ProgramData\SystemData\igfxCUIService.exe family_sysjoker \ProgramData\SystemData\igfxCUIService.exe family_sysjoker C:\ProgramData\SystemData\igfxCUIService.exe family_sysjoker -
Executes dropped EXE 1 IoCs
Processes:
igfxCUIService.exepid process 904 igfxCUIService.exe -
Loads dropped DLL 2 IoCs
Processes:
tmpscsa0hng.exepid process 1420 tmpscsa0hng.exe 1420 tmpscsa0hng.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 1728 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1728 powershell.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
tmpscsa0hng.exedescription pid process target process PID 1420 wrote to memory of 1728 1420 tmpscsa0hng.exe powershell.exe PID 1420 wrote to memory of 1728 1420 tmpscsa0hng.exe powershell.exe PID 1420 wrote to memory of 1728 1420 tmpscsa0hng.exe powershell.exe PID 1420 wrote to memory of 1728 1420 tmpscsa0hng.exe powershell.exe PID 1420 wrote to memory of 904 1420 tmpscsa0hng.exe igfxCUIService.exe PID 1420 wrote to memory of 904 1420 tmpscsa0hng.exe igfxCUIService.exe PID 1420 wrote to memory of 904 1420 tmpscsa0hng.exe igfxCUIService.exe PID 1420 wrote to memory of 904 1420 tmpscsa0hng.exe igfxCUIService.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmpscsa0hng.exe"C:\Users\Admin\AppData\Local\Temp\tmpscsa0hng.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" copy 'C:\Users\Admin\AppData\Local\Temp\tmpscsa0hng.exe' 'C:\ProgramData\SystemData\igfxCUIService.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
-
C:\ProgramData\SystemData\igfxCUIService.exe"C:\ProgramData\SystemData\igfxCUIService.exe"2⤵
- Executes dropped EXE
PID:904
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
392KB
MD5d90d0f4d6dad402b5d025987030cc87c
SHA1fad66bdf5c5dc2c050cbc574832c6995dba086a0
SHA2561ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c
SHA512c2faeacfd588585633630ad710f443a72c7617c2d5e37dbfe43570e6ac5904e4b81eb682356a48a93bb794ef5e9d8ad0d673966d57798079b4de62ea61241024
-
Filesize
392KB
MD5d90d0f4d6dad402b5d025987030cc87c
SHA1fad66bdf5c5dc2c050cbc574832c6995dba086a0
SHA2561ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c
SHA512c2faeacfd588585633630ad710f443a72c7617c2d5e37dbfe43570e6ac5904e4b81eb682356a48a93bb794ef5e9d8ad0d673966d57798079b4de62ea61241024
-
Filesize
392KB
MD5d90d0f4d6dad402b5d025987030cc87c
SHA1fad66bdf5c5dc2c050cbc574832c6995dba086a0
SHA2561ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c
SHA512c2faeacfd588585633630ad710f443a72c7617c2d5e37dbfe43570e6ac5904e4b81eb682356a48a93bb794ef5e9d8ad0d673966d57798079b4de62ea61241024
-
Filesize
392KB
MD5d90d0f4d6dad402b5d025987030cc87c
SHA1fad66bdf5c5dc2c050cbc574832c6995dba086a0
SHA2561ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c
SHA512c2faeacfd588585633630ad710f443a72c7617c2d5e37dbfe43570e6ac5904e4b81eb682356a48a93bb794ef5e9d8ad0d673966d57798079b4de62ea61241024