Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 00:37
Static task
static1
Behavioral task
behavioral1
Sample
d75e17b0e708e0a5f3dba94f35fc925d12d67a7af4d569b0efa13433f2eee9e9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d75e17b0e708e0a5f3dba94f35fc925d12d67a7af4d569b0efa13433f2eee9e9.exe
Resource
win10v2004-20220901-en
General
-
Target
d75e17b0e708e0a5f3dba94f35fc925d12d67a7af4d569b0efa13433f2eee9e9.exe
-
Size
305KB
-
MD5
6b42c667ec04b4363ce4db9ef99d52e0
-
SHA1
081d2ce224108b75cec0e7c641bc20b188013636
-
SHA256
d75e17b0e708e0a5f3dba94f35fc925d12d67a7af4d569b0efa13433f2eee9e9
-
SHA512
78749b714de39cc0cb1f818c0ef44beb38fddbbd5f850f21ee496507d486c5dce1a4f96be7eff4fff07a7b148f06118966bc9b8fc30435637f6f1e470098b7a8
-
SSDEEP
6144:XREPQ8/32oYMfHGD0A/CTOyGBBHYQgceGpVw3GeF0egQuEKGC4Ni6acTrr4J2:X8/32Z0A6rGyceGpVw2eOeNuEKGDN1LF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1552 jygut.exe -
Deletes itself 1 IoCs
pid Process 992 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1752 d75e17b0e708e0a5f3dba94f35fc925d12d67a7af4d569b0efa13433f2eee9e9.exe 1752 d75e17b0e708e0a5f3dba94f35fc925d12d67a7af4d569b0efa13433f2eee9e9.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run jygut.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\{CB118568-7F59-AD4D-CD9C-5E5DE9C17D40} = "C:\\Users\\Admin\\AppData\\Roaming\\Oxofx\\jygut.exe" jygut.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1752 set thread context of 992 1752 d75e17b0e708e0a5f3dba94f35fc925d12d67a7af4d569b0efa13433f2eee9e9.exe 28 -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1552 jygut.exe 1552 jygut.exe 1552 jygut.exe 1552 jygut.exe 1552 jygut.exe 1552 jygut.exe 1552 jygut.exe 1552 jygut.exe 1552 jygut.exe 1552 jygut.exe 1552 jygut.exe 1552 jygut.exe 1552 jygut.exe 1552 jygut.exe 1552 jygut.exe 1552 jygut.exe 1552 jygut.exe 1552 jygut.exe 1552 jygut.exe 1552 jygut.exe 1552 jygut.exe 1552 jygut.exe 1552 jygut.exe 1552 jygut.exe 1552 jygut.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1752 wrote to memory of 1552 1752 d75e17b0e708e0a5f3dba94f35fc925d12d67a7af4d569b0efa13433f2eee9e9.exe 27 PID 1752 wrote to memory of 1552 1752 d75e17b0e708e0a5f3dba94f35fc925d12d67a7af4d569b0efa13433f2eee9e9.exe 27 PID 1752 wrote to memory of 1552 1752 d75e17b0e708e0a5f3dba94f35fc925d12d67a7af4d569b0efa13433f2eee9e9.exe 27 PID 1752 wrote to memory of 1552 1752 d75e17b0e708e0a5f3dba94f35fc925d12d67a7af4d569b0efa13433f2eee9e9.exe 27 PID 1552 wrote to memory of 1116 1552 jygut.exe 15 PID 1552 wrote to memory of 1116 1552 jygut.exe 15 PID 1552 wrote to memory of 1116 1552 jygut.exe 15 PID 1552 wrote to memory of 1116 1552 jygut.exe 15 PID 1552 wrote to memory of 1116 1552 jygut.exe 15 PID 1552 wrote to memory of 1180 1552 jygut.exe 14 PID 1552 wrote to memory of 1180 1552 jygut.exe 14 PID 1552 wrote to memory of 1180 1552 jygut.exe 14 PID 1552 wrote to memory of 1180 1552 jygut.exe 14 PID 1552 wrote to memory of 1180 1552 jygut.exe 14 PID 1552 wrote to memory of 1236 1552 jygut.exe 8 PID 1552 wrote to memory of 1236 1552 jygut.exe 8 PID 1552 wrote to memory of 1236 1552 jygut.exe 8 PID 1552 wrote to memory of 1236 1552 jygut.exe 8 PID 1552 wrote to memory of 1236 1552 jygut.exe 8 PID 1552 wrote to memory of 1752 1552 jygut.exe 26 PID 1552 wrote to memory of 1752 1552 jygut.exe 26 PID 1552 wrote to memory of 1752 1552 jygut.exe 26 PID 1552 wrote to memory of 1752 1552 jygut.exe 26 PID 1552 wrote to memory of 1752 1552 jygut.exe 26 PID 1752 wrote to memory of 992 1752 d75e17b0e708e0a5f3dba94f35fc925d12d67a7af4d569b0efa13433f2eee9e9.exe 28 PID 1752 wrote to memory of 992 1752 d75e17b0e708e0a5f3dba94f35fc925d12d67a7af4d569b0efa13433f2eee9e9.exe 28 PID 1752 wrote to memory of 992 1752 d75e17b0e708e0a5f3dba94f35fc925d12d67a7af4d569b0efa13433f2eee9e9.exe 28 PID 1752 wrote to memory of 992 1752 d75e17b0e708e0a5f3dba94f35fc925d12d67a7af4d569b0efa13433f2eee9e9.exe 28 PID 1752 wrote to memory of 992 1752 d75e17b0e708e0a5f3dba94f35fc925d12d67a7af4d569b0efa13433f2eee9e9.exe 28 PID 1752 wrote to memory of 992 1752 d75e17b0e708e0a5f3dba94f35fc925d12d67a7af4d569b0efa13433f2eee9e9.exe 28 PID 1752 wrote to memory of 992 1752 d75e17b0e708e0a5f3dba94f35fc925d12d67a7af4d569b0efa13433f2eee9e9.exe 28 PID 1752 wrote to memory of 992 1752 d75e17b0e708e0a5f3dba94f35fc925d12d67a7af4d569b0efa13433f2eee9e9.exe 28 PID 1752 wrote to memory of 992 1752 d75e17b0e708e0a5f3dba94f35fc925d12d67a7af4d569b0efa13433f2eee9e9.exe 28
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\d75e17b0e708e0a5f3dba94f35fc925d12d67a7af4d569b0efa13433f2eee9e9.exe"C:\Users\Admin\AppData\Local\Temp\d75e17b0e708e0a5f3dba94f35fc925d12d67a7af4d569b0efa13433f2eee9e9.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Roaming\Oxofx\jygut.exe"C:\Users\Admin\AppData\Roaming\Oxofx\jygut.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1552
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpd2c5b11c.bat"3⤵
- Deletes itself
PID:992
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1180
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD555519228ebc2976b4e83381f66ce9111
SHA1df0852f2a784f975f9ee6d52b4d2f76ddcee8b25
SHA25679dd89dd960a9a135044276fe4dbe3cd38aa8d136334e8cfaed070c6de3327ec
SHA512b472c07420007c027794ff70c8b1c4da413584d1aabeb0e88f45efc4dc998dd56cbae277b1435c2cad9e56197ea3e512cb382d884ab16f88e69db466a3a954c0
-
Filesize
305KB
MD5cd66a65a443099ac4a999a9ab78dea65
SHA1ae54fe986856d236819b6199a8478ea4497fc0f1
SHA256529b30a0e6536221411d0010cb1eb2079583f094b2641d040d9be18edfdf185d
SHA512ea10911e4e5c4a44678c884f17c099efed77ae12e32fea31bf06a42c9d7989ec08374c0daf3d2e8eeae780920e6d2fc978bc1c682e42df9c1df2e302b2928bb1
-
Filesize
305KB
MD5cd66a65a443099ac4a999a9ab78dea65
SHA1ae54fe986856d236819b6199a8478ea4497fc0f1
SHA256529b30a0e6536221411d0010cb1eb2079583f094b2641d040d9be18edfdf185d
SHA512ea10911e4e5c4a44678c884f17c099efed77ae12e32fea31bf06a42c9d7989ec08374c0daf3d2e8eeae780920e6d2fc978bc1c682e42df9c1df2e302b2928bb1
-
Filesize
305KB
MD5cd66a65a443099ac4a999a9ab78dea65
SHA1ae54fe986856d236819b6199a8478ea4497fc0f1
SHA256529b30a0e6536221411d0010cb1eb2079583f094b2641d040d9be18edfdf185d
SHA512ea10911e4e5c4a44678c884f17c099efed77ae12e32fea31bf06a42c9d7989ec08374c0daf3d2e8eeae780920e6d2fc978bc1c682e42df9c1df2e302b2928bb1
-
Filesize
305KB
MD5cd66a65a443099ac4a999a9ab78dea65
SHA1ae54fe986856d236819b6199a8478ea4497fc0f1
SHA256529b30a0e6536221411d0010cb1eb2079583f094b2641d040d9be18edfdf185d
SHA512ea10911e4e5c4a44678c884f17c099efed77ae12e32fea31bf06a42c9d7989ec08374c0daf3d2e8eeae780920e6d2fc978bc1c682e42df9c1df2e302b2928bb1