Analysis
-
max time kernel
151s -
max time network
72s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 00:41
Static task
static1
Behavioral task
behavioral1
Sample
082e4c1241a643a4c240e66a6e3f15acefcc42571c7f64d2d0c99a0ad84f1311.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
082e4c1241a643a4c240e66a6e3f15acefcc42571c7f64d2d0c99a0ad84f1311.exe
Resource
win10v2004-20220812-en
General
-
Target
082e4c1241a643a4c240e66a6e3f15acefcc42571c7f64d2d0c99a0ad84f1311.exe
-
Size
140KB
-
MD5
6b69460ef0fcc012274313e69225efa0
-
SHA1
6efb507768cc48cd72a9a3da992961ba2091f8ee
-
SHA256
082e4c1241a643a4c240e66a6e3f15acefcc42571c7f64d2d0c99a0ad84f1311
-
SHA512
bea58ff82e46526898e94d21ba9ba74dcd5f829aae56a19564c40feb824696da7564e06c5ed968aaa7c63cc4547fab96a44981132bd033975b591790990c026b
-
SSDEEP
1536:gJoQjKVQrGG1YAcANSU+MNG5ipzqYbCa3458X77UsMJn1ogCnzqLcTJLO01DvqKx:/QrrGsYnAS4R77UsMJn1oufG+O7
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jaulot.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 082e4c1241a643a4c240e66a6e3f15acefcc42571c7f64d2d0c99a0ad84f1311.exe -
Executes dropped EXE 1 IoCs
pid Process 2020 jaulot.exe -
Loads dropped DLL 2 IoCs
pid Process 1952 082e4c1241a643a4c240e66a6e3f15acefcc42571c7f64d2d0c99a0ad84f1311.exe 1952 082e4c1241a643a4c240e66a6e3f15acefcc42571c7f64d2d0c99a0ad84f1311.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaulot = "C:\\Users\\Admin\\jaulot.exe /w" jaulot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaulot = "C:\\Users\\Admin\\jaulot.exe /q" jaulot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaulot = "C:\\Users\\Admin\\jaulot.exe /a" jaulot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaulot = "C:\\Users\\Admin\\jaulot.exe /l" jaulot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaulot = "C:\\Users\\Admin\\jaulot.exe /h" jaulot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaulot = "C:\\Users\\Admin\\jaulot.exe /v" jaulot.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 082e4c1241a643a4c240e66a6e3f15acefcc42571c7f64d2d0c99a0ad84f1311.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaulot = "C:\\Users\\Admin\\jaulot.exe /c" jaulot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaulot = "C:\\Users\\Admin\\jaulot.exe /g" jaulot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaulot = "C:\\Users\\Admin\\jaulot.exe /p" jaulot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaulot = "C:\\Users\\Admin\\jaulot.exe /d" jaulot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaulot = "C:\\Users\\Admin\\jaulot.exe /x" jaulot.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ jaulot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaulot = "C:\\Users\\Admin\\jaulot.exe /r" jaulot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaulot = "C:\\Users\\Admin\\jaulot.exe /k" jaulot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaulot = "C:\\Users\\Admin\\jaulot.exe /m" jaulot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaulot = "C:\\Users\\Admin\\jaulot.exe /n" 082e4c1241a643a4c240e66a6e3f15acefcc42571c7f64d2d0c99a0ad84f1311.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaulot = "C:\\Users\\Admin\\jaulot.exe /u" jaulot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaulot = "C:\\Users\\Admin\\jaulot.exe /f" jaulot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaulot = "C:\\Users\\Admin\\jaulot.exe /o" jaulot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaulot = "C:\\Users\\Admin\\jaulot.exe /y" jaulot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaulot = "C:\\Users\\Admin\\jaulot.exe /n" jaulot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaulot = "C:\\Users\\Admin\\jaulot.exe /j" jaulot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaulot = "C:\\Users\\Admin\\jaulot.exe /b" jaulot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaulot = "C:\\Users\\Admin\\jaulot.exe /s" jaulot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaulot = "C:\\Users\\Admin\\jaulot.exe /z" jaulot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaulot = "C:\\Users\\Admin\\jaulot.exe /e" jaulot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaulot = "C:\\Users\\Admin\\jaulot.exe /i" jaulot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\jaulot = "C:\\Users\\Admin\\jaulot.exe /t" jaulot.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1952 082e4c1241a643a4c240e66a6e3f15acefcc42571c7f64d2d0c99a0ad84f1311.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe 2020 jaulot.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1952 082e4c1241a643a4c240e66a6e3f15acefcc42571c7f64d2d0c99a0ad84f1311.exe 1952 082e4c1241a643a4c240e66a6e3f15acefcc42571c7f64d2d0c99a0ad84f1311.exe 2020 jaulot.exe 2020 jaulot.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2020 1952 082e4c1241a643a4c240e66a6e3f15acefcc42571c7f64d2d0c99a0ad84f1311.exe 28 PID 1952 wrote to memory of 2020 1952 082e4c1241a643a4c240e66a6e3f15acefcc42571c7f64d2d0c99a0ad84f1311.exe 28 PID 1952 wrote to memory of 2020 1952 082e4c1241a643a4c240e66a6e3f15acefcc42571c7f64d2d0c99a0ad84f1311.exe 28 PID 1952 wrote to memory of 2020 1952 082e4c1241a643a4c240e66a6e3f15acefcc42571c7f64d2d0c99a0ad84f1311.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\082e4c1241a643a4c240e66a6e3f15acefcc42571c7f64d2d0c99a0ad84f1311.exe"C:\Users\Admin\AppData\Local\Temp\082e4c1241a643a4c240e66a6e3f15acefcc42571c7f64d2d0c99a0ad84f1311.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\jaulot.exe"C:\Users\Admin\jaulot.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2020
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD54249c23a0ebdf57d5e1d32dc47906828
SHA1ae5598d72ef0ac442644275421bc623f7fea9512
SHA2560a675121665437a968462972e28b6e7e800b37fa9cf7c5f07a7ecfe70aa68db7
SHA512f70f3a329b57f081df9291e9575a7400c3c37797c5819f2a4befdc7ab898823ccbec040df1e36b9bf0e3f91e9d0742d3bb070b29ca1d09bd11543b73dca71c5e
-
Filesize
140KB
MD54249c23a0ebdf57d5e1d32dc47906828
SHA1ae5598d72ef0ac442644275421bc623f7fea9512
SHA2560a675121665437a968462972e28b6e7e800b37fa9cf7c5f07a7ecfe70aa68db7
SHA512f70f3a329b57f081df9291e9575a7400c3c37797c5819f2a4befdc7ab898823ccbec040df1e36b9bf0e3f91e9d0742d3bb070b29ca1d09bd11543b73dca71c5e
-
Filesize
140KB
MD54249c23a0ebdf57d5e1d32dc47906828
SHA1ae5598d72ef0ac442644275421bc623f7fea9512
SHA2560a675121665437a968462972e28b6e7e800b37fa9cf7c5f07a7ecfe70aa68db7
SHA512f70f3a329b57f081df9291e9575a7400c3c37797c5819f2a4befdc7ab898823ccbec040df1e36b9bf0e3f91e9d0742d3bb070b29ca1d09bd11543b73dca71c5e
-
Filesize
140KB
MD54249c23a0ebdf57d5e1d32dc47906828
SHA1ae5598d72ef0ac442644275421bc623f7fea9512
SHA2560a675121665437a968462972e28b6e7e800b37fa9cf7c5f07a7ecfe70aa68db7
SHA512f70f3a329b57f081df9291e9575a7400c3c37797c5819f2a4befdc7ab898823ccbec040df1e36b9bf0e3f91e9d0742d3bb070b29ca1d09bd11543b73dca71c5e