Analysis
-
max time kernel
77s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2022 17:38
Static task
static1
Behavioral task
behavioral1
Sample
KJLKDOX.exe
Resource
win7-20220812-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
KJLKDOX.exe
Resource
win10v2004-20220901-en
4 signatures
150 seconds
General
-
Target
KJLKDOX.exe
-
Size
3.9MB
-
MD5
64b30e9465580bc5af03f01e930e04b3
-
SHA1
727f463e282cc19e4a55b96dd05c60d4bc8b460a
-
SHA256
5a3544515807da069035c75e37e1570b893768eeab16385402b0464fd26272c0
-
SHA512
d846ba776ff4ccfea1ab9f812266736d814b158731a0ec6e542c9d791d43714ff376f0746aad9257a60bc68b8b4a33f204763b5ba8cd5d4d988af504c9cea81c
-
SSDEEP
98304:6PgeUa+s1ybDLoAu4xe8qm8jttGnwSYWqwO0+ny+UEq:6PcQynL3uuq3RtGCwO0wysq
Score
10/10
Malware Config
Extracted
Family
raccoon
Botnet
9b19cf60d9bdf65b8a2495aa965456c3
C2
http://94.131.107.206
rc4.plain
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
KJLKDOX.exedescription pid process target process PID 2488 set thread context of 4776 2488 KJLKDOX.exe jsc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
KJLKDOX.exedescription pid process Token: SeDebugPrivilege 2488 KJLKDOX.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
KJLKDOX.exedescription pid process target process PID 2488 wrote to memory of 4776 2488 KJLKDOX.exe jsc.exe PID 2488 wrote to memory of 4776 2488 KJLKDOX.exe jsc.exe PID 2488 wrote to memory of 4776 2488 KJLKDOX.exe jsc.exe PID 2488 wrote to memory of 4776 2488 KJLKDOX.exe jsc.exe PID 2488 wrote to memory of 4776 2488 KJLKDOX.exe jsc.exe PID 2488 wrote to memory of 4776 2488 KJLKDOX.exe jsc.exe PID 2488 wrote to memory of 4776 2488 KJLKDOX.exe jsc.exe PID 2488 wrote to memory of 4776 2488 KJLKDOX.exe jsc.exe PID 2488 wrote to memory of 4776 2488 KJLKDOX.exe jsc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\KJLKDOX.exe"C:\Users\Admin\AppData\Local\Temp\KJLKDOX.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\jsc.exe"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2488-132-0x0000000000940000-0x0000000000D36000-memory.dmpFilesize
4.0MB
-
memory/2488-133-0x00007FF82DF10000-0x00007FF82E9D1000-memory.dmpFilesize
10.8MB
-
memory/2488-134-0x00007FF82DF10000-0x00007FF82E9D1000-memory.dmpFilesize
10.8MB
-
memory/2488-135-0x000000001BE90000-0x000000001C00E000-memory.dmpFilesize
1.5MB
-
memory/2488-136-0x000000001B940000-0x000000001B9BC000-memory.dmpFilesize
496KB
-
memory/2488-141-0x00007FF82DF10000-0x00007FF82E9D1000-memory.dmpFilesize
10.8MB
-
memory/4776-137-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/4776-138-0x0000000000408597-mapping.dmp
-
memory/4776-140-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/4776-142-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/4776-143-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB