Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 19:03
Static task
static1
Behavioral task
behavioral1
Sample
6e42905e799a7eb381fac7295945677cc4862273179e0590890867ad51bc07e7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6e42905e799a7eb381fac7295945677cc4862273179e0590890867ad51bc07e7.exe
Resource
win10v2004-20220812-en
General
-
Target
6e42905e799a7eb381fac7295945677cc4862273179e0590890867ad51bc07e7.exe
-
Size
295KB
-
MD5
86da2f013eb3abc310b142a5f317129b
-
SHA1
49dd0da652510dd5e8fa9a30d04bda208e83f186
-
SHA256
6e42905e799a7eb381fac7295945677cc4862273179e0590890867ad51bc07e7
-
SHA512
3bfd6d1fba78a6fcf5dddec449a539849fe4f70ffc8555b139cd6b1c5f3fb1731ff501f7efecc88c6d9a1b40ce11e5006dc3d2aa28b13c501d4868d1cadc5dd4
-
SSDEEP
6144:BiGtsLOAlqNC+I+1PTG/qm/PgCnmUSFMhl4f+M/oI29dK9:0GtsLVt+N1PTEn/iUSFM8f+rI2g9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 984 ijejse.exe -
Deletes itself 1 IoCs
pid Process 1700 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 2028 6e42905e799a7eb381fac7295945677cc4862273179e0590890867ad51bc07e7.exe 2028 6e42905e799a7eb381fac7295945677cc4862273179e0590890867ad51bc07e7.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\Currentversion\Run ijejse.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\{CB118568-7F59-AD4D-CD9C-5E5DE9C17D40} = "C:\\Users\\Admin\\AppData\\Roaming\\Ongiyx\\ijejse.exe" ijejse.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2028 set thread context of 1700 2028 6e42905e799a7eb381fac7295945677cc4862273179e0590890867ad51bc07e7.exe 28 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Privacy 6e42905e799a7eb381fac7295945677cc4862273179e0590890867ad51bc07e7.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 6e42905e799a7eb381fac7295945677cc4862273179e0590890867ad51bc07e7.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 984 ijejse.exe 984 ijejse.exe 984 ijejse.exe 984 ijejse.exe 984 ijejse.exe 984 ijejse.exe 984 ijejse.exe 984 ijejse.exe 984 ijejse.exe 984 ijejse.exe 984 ijejse.exe 984 ijejse.exe 984 ijejse.exe 984 ijejse.exe 984 ijejse.exe 984 ijejse.exe 984 ijejse.exe 984 ijejse.exe 984 ijejse.exe 984 ijejse.exe 984 ijejse.exe 984 ijejse.exe 984 ijejse.exe 984 ijejse.exe 984 ijejse.exe 984 ijejse.exe 984 ijejse.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2028 6e42905e799a7eb381fac7295945677cc4862273179e0590890867ad51bc07e7.exe 984 ijejse.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2028 wrote to memory of 984 2028 6e42905e799a7eb381fac7295945677cc4862273179e0590890867ad51bc07e7.exe 27 PID 2028 wrote to memory of 984 2028 6e42905e799a7eb381fac7295945677cc4862273179e0590890867ad51bc07e7.exe 27 PID 2028 wrote to memory of 984 2028 6e42905e799a7eb381fac7295945677cc4862273179e0590890867ad51bc07e7.exe 27 PID 2028 wrote to memory of 984 2028 6e42905e799a7eb381fac7295945677cc4862273179e0590890867ad51bc07e7.exe 27 PID 984 wrote to memory of 1264 984 ijejse.exe 18 PID 984 wrote to memory of 1264 984 ijejse.exe 18 PID 984 wrote to memory of 1264 984 ijejse.exe 18 PID 984 wrote to memory of 1264 984 ijejse.exe 18 PID 984 wrote to memory of 1264 984 ijejse.exe 18 PID 984 wrote to memory of 1340 984 ijejse.exe 19 PID 984 wrote to memory of 1340 984 ijejse.exe 19 PID 984 wrote to memory of 1340 984 ijejse.exe 19 PID 984 wrote to memory of 1340 984 ijejse.exe 19 PID 984 wrote to memory of 1340 984 ijejse.exe 19 PID 984 wrote to memory of 1400 984 ijejse.exe 20 PID 984 wrote to memory of 1400 984 ijejse.exe 20 PID 984 wrote to memory of 1400 984 ijejse.exe 20 PID 984 wrote to memory of 1400 984 ijejse.exe 20 PID 984 wrote to memory of 1400 984 ijejse.exe 20 PID 984 wrote to memory of 2028 984 ijejse.exe 26 PID 984 wrote to memory of 2028 984 ijejse.exe 26 PID 984 wrote to memory of 2028 984 ijejse.exe 26 PID 984 wrote to memory of 2028 984 ijejse.exe 26 PID 984 wrote to memory of 2028 984 ijejse.exe 26 PID 2028 wrote to memory of 1700 2028 6e42905e799a7eb381fac7295945677cc4862273179e0590890867ad51bc07e7.exe 28 PID 2028 wrote to memory of 1700 2028 6e42905e799a7eb381fac7295945677cc4862273179e0590890867ad51bc07e7.exe 28 PID 2028 wrote to memory of 1700 2028 6e42905e799a7eb381fac7295945677cc4862273179e0590890867ad51bc07e7.exe 28 PID 2028 wrote to memory of 1700 2028 6e42905e799a7eb381fac7295945677cc4862273179e0590890867ad51bc07e7.exe 28 PID 2028 wrote to memory of 1700 2028 6e42905e799a7eb381fac7295945677cc4862273179e0590890867ad51bc07e7.exe 28 PID 2028 wrote to memory of 1700 2028 6e42905e799a7eb381fac7295945677cc4862273179e0590890867ad51bc07e7.exe 28 PID 2028 wrote to memory of 1700 2028 6e42905e799a7eb381fac7295945677cc4862273179e0590890867ad51bc07e7.exe 28 PID 2028 wrote to memory of 1700 2028 6e42905e799a7eb381fac7295945677cc4862273179e0590890867ad51bc07e7.exe 28 PID 2028 wrote to memory of 1700 2028 6e42905e799a7eb381fac7295945677cc4862273179e0590890867ad51bc07e7.exe 28
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1264
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1340
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\6e42905e799a7eb381fac7295945677cc4862273179e0590890867ad51bc07e7.exe"C:\Users\Admin\AppData\Local\Temp\6e42905e799a7eb381fac7295945677cc4862273179e0590890867ad51bc07e7.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Roaming\Ongiyx\ijejse.exe"C:\Users\Admin\AppData\Roaming\Ongiyx\ijejse.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:984
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp7a119288.bat"3⤵
- Deletes itself
PID:1700
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD51c13bf85e846a2a105bcdd890d20abfe
SHA16cade25bbf7b0290861f26edba01a18d30bb5df8
SHA2568258b562650bae8eb131ce87ca4884fb94de56bd764a26b7cd269783b874ea99
SHA51299454ba649edbab71c762c0dcdce852298aaa4dc7a0a67c2f856c2afdb920a4a45fc7ca3a57898c87a3475b4b4ddcc44d412e644e6de68e9c382fbf43aa26e7c
-
Filesize
295KB
MD54ad0f9b77094bf54233a2c8c90a68bff
SHA113bea6283097bb5f98756e758de62ab504f21a33
SHA256d7926285e59da451761b166dac89c47f54658480cb2e99659184342767968b82
SHA5126c32d2a4741b1dd92eae178dda799531cd38de9c1f7d13b9ca4055d3171bd37fb65d2bf81b259a8b76b029dfdcc2c7792c8f90ecb4c32968c6c247ab2ac7aeb7
-
Filesize
295KB
MD54ad0f9b77094bf54233a2c8c90a68bff
SHA113bea6283097bb5f98756e758de62ab504f21a33
SHA256d7926285e59da451761b166dac89c47f54658480cb2e99659184342767968b82
SHA5126c32d2a4741b1dd92eae178dda799531cd38de9c1f7d13b9ca4055d3171bd37fb65d2bf81b259a8b76b029dfdcc2c7792c8f90ecb4c32968c6c247ab2ac7aeb7
-
Filesize
295KB
MD54ad0f9b77094bf54233a2c8c90a68bff
SHA113bea6283097bb5f98756e758de62ab504f21a33
SHA256d7926285e59da451761b166dac89c47f54658480cb2e99659184342767968b82
SHA5126c32d2a4741b1dd92eae178dda799531cd38de9c1f7d13b9ca4055d3171bd37fb65d2bf81b259a8b76b029dfdcc2c7792c8f90ecb4c32968c6c247ab2ac7aeb7
-
Filesize
295KB
MD54ad0f9b77094bf54233a2c8c90a68bff
SHA113bea6283097bb5f98756e758de62ab504f21a33
SHA256d7926285e59da451761b166dac89c47f54658480cb2e99659184342767968b82
SHA5126c32d2a4741b1dd92eae178dda799531cd38de9c1f7d13b9ca4055d3171bd37fb65d2bf81b259a8b76b029dfdcc2c7792c8f90ecb4c32968c6c247ab2ac7aeb7