Analysis
-
max time kernel
153s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 02:48
Static task
static1
Behavioral task
behavioral1
Sample
181a0d1578b0434ef24edde5a17ec12299ffbbf46b1a57e65dad4b71818c9ccf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
181a0d1578b0434ef24edde5a17ec12299ffbbf46b1a57e65dad4b71818c9ccf.exe
Resource
win10v2004-20220812-en
General
-
Target
181a0d1578b0434ef24edde5a17ec12299ffbbf46b1a57e65dad4b71818c9ccf.exe
-
Size
524KB
-
MD5
002054540ed137853e3ec77b979e6d9a
-
SHA1
c74a55cf44167cf56f3baf547228a58e488030ac
-
SHA256
181a0d1578b0434ef24edde5a17ec12299ffbbf46b1a57e65dad4b71818c9ccf
-
SHA512
e2f7f7c4340f387eae6875ece36081ff98ee4f61150f56522f49b7ef2f4203ae2dcef77b77b4349fb9241f85cca0caafcc84111b3a716211f9ddbc251e719dc1
-
SSDEEP
12288:+SFMFpuhRp8tmnkX4C4IosE/rSkU19Zt/kMM22:JF+u+gkX3o1jSkErM2
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" JB3O2vP3.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jeuac.exe -
Executes dropped EXE 10 IoCs
pid Process 4216 JB3O2vP3.exe 4824 jeuac.exe 4960 2sun.exe 3656 2sun.exe 4876 2sun.exe 2892 2sun.exe 456 2sun.exe 3324 2sun.exe 3528 3sun.exe 3100 X -
resource yara_rule behavioral2/memory/3656-152-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral2/memory/3656-158-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral2/memory/4876-162-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/2892-164-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/456-170-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral2/memory/4876-163-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/4876-157-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/3656-156-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral2/memory/2892-172-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2892-175-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/456-176-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral2/memory/456-178-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral2/memory/3656-181-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral2/memory/4876-182-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/2892-183-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/456-184-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral2/memory/3656-185-0x0000000000400000-0x0000000000407000-memory.dmp upx -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation JB3O2vP3.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 181a0d1578b0434ef24edde5a17ec12299ffbbf46b1a57e65dad4b71818c9ccf.exe -
Unexpected DNS network traffic destination 2 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 31.193.3.240 Destination IP 31.193.3.240 -
Adds Run key to start application 2 TTPs 54 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /e" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /X" JB3O2vP3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /Z" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /y" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /p" jeuac.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /K" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /a" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /W" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /U" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /c" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /L" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /x" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /F" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /k" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /Y" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /I" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /u" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /t" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /X" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /g" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /C" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /o" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /f" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /H" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /s" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /b" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /S" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /v" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /N" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /J" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /l" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /m" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /E" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /M" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /q" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /r" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /D" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /T" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /n" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /V" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /Q" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /d" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /A" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /G" jeuac.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ JB3O2vP3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /P" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /R" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /h" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /w" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /z" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /i" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /B" jeuac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuac = "C:\\Users\\Admin\\jeuac.exe /O" jeuac.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 2sun.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 2sun.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 4960 set thread context of 3656 4960 2sun.exe 87 PID 4960 set thread context of 4876 4960 2sun.exe 88 PID 4960 set thread context of 2892 4960 2sun.exe 89 PID 4960 set thread context of 456 4960 2sun.exe 90 PID 4960 set thread context of 3324 4960 2sun.exe 91 PID 3528 set thread context of 1316 3528 3sun.exe 98 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3364 3324 WerFault.exe 91 -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 3488 tasklist.exe 2336 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4216 JB3O2vP3.exe 4216 JB3O2vP3.exe 4216 JB3O2vP3.exe 4216 JB3O2vP3.exe 4876 2sun.exe 4876 2sun.exe 2892 2sun.exe 2892 2sun.exe 4824 jeuac.exe 4824 jeuac.exe 4824 jeuac.exe 4824 jeuac.exe 4824 jeuac.exe 4824 jeuac.exe 4876 2sun.exe 4876 2sun.exe 2892 2sun.exe 2892 2sun.exe 4824 jeuac.exe 4824 jeuac.exe 3528 3sun.exe 3528 3sun.exe 4824 jeuac.exe 4824 jeuac.exe 3100 X 3100 X 4824 jeuac.exe 4824 jeuac.exe 4824 jeuac.exe 4824 jeuac.exe 4876 2sun.exe 4876 2sun.exe 4824 jeuac.exe 4824 jeuac.exe 4876 2sun.exe 4876 2sun.exe 4876 2sun.exe 4876 2sun.exe 4824 jeuac.exe 4824 jeuac.exe 4824 jeuac.exe 4824 jeuac.exe 4824 jeuac.exe 4824 jeuac.exe 4876 2sun.exe 4876 2sun.exe 4876 2sun.exe 4876 2sun.exe 4824 jeuac.exe 4824 jeuac.exe 4876 2sun.exe 4876 2sun.exe 4824 jeuac.exe 4824 jeuac.exe 4824 jeuac.exe 4824 jeuac.exe 4876 2sun.exe 4876 2sun.exe 4824 jeuac.exe 4824 jeuac.exe 4876 2sun.exe 4876 2sun.exe 4824 jeuac.exe 4824 jeuac.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2576 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 3488 tasklist.exe Token: SeDebugPrivilege 3528 3sun.exe Token: SeDebugPrivilege 3528 3sun.exe Token: SeShutdownPrivilege 2576 Explorer.EXE Token: SeCreatePagefilePrivilege 2576 Explorer.EXE Token: SeShutdownPrivilege 2576 Explorer.EXE Token: SeCreatePagefilePrivilege 2576 Explorer.EXE Token: SeDebugPrivilege 2336 tasklist.exe Token: SeShutdownPrivilege 2576 Explorer.EXE Token: SeCreatePagefilePrivilege 2576 Explorer.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2040 181a0d1578b0434ef24edde5a17ec12299ffbbf46b1a57e65dad4b71818c9ccf.exe 4216 JB3O2vP3.exe 4824 jeuac.exe 4960 2sun.exe 3656 2sun.exe 456 2sun.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2040 wrote to memory of 4216 2040 181a0d1578b0434ef24edde5a17ec12299ffbbf46b1a57e65dad4b71818c9ccf.exe 81 PID 2040 wrote to memory of 4216 2040 181a0d1578b0434ef24edde5a17ec12299ffbbf46b1a57e65dad4b71818c9ccf.exe 81 PID 2040 wrote to memory of 4216 2040 181a0d1578b0434ef24edde5a17ec12299ffbbf46b1a57e65dad4b71818c9ccf.exe 81 PID 4216 wrote to memory of 4824 4216 JB3O2vP3.exe 82 PID 4216 wrote to memory of 4824 4216 JB3O2vP3.exe 82 PID 4216 wrote to memory of 4824 4216 JB3O2vP3.exe 82 PID 4216 wrote to memory of 2752 4216 JB3O2vP3.exe 83 PID 4216 wrote to memory of 2752 4216 JB3O2vP3.exe 83 PID 4216 wrote to memory of 2752 4216 JB3O2vP3.exe 83 PID 2752 wrote to memory of 3488 2752 cmd.exe 85 PID 2752 wrote to memory of 3488 2752 cmd.exe 85 PID 2752 wrote to memory of 3488 2752 cmd.exe 85 PID 2040 wrote to memory of 4960 2040 181a0d1578b0434ef24edde5a17ec12299ffbbf46b1a57e65dad4b71818c9ccf.exe 86 PID 2040 wrote to memory of 4960 2040 181a0d1578b0434ef24edde5a17ec12299ffbbf46b1a57e65dad4b71818c9ccf.exe 86 PID 2040 wrote to memory of 4960 2040 181a0d1578b0434ef24edde5a17ec12299ffbbf46b1a57e65dad4b71818c9ccf.exe 86 PID 4960 wrote to memory of 3656 4960 2sun.exe 87 PID 4960 wrote to memory of 3656 4960 2sun.exe 87 PID 4960 wrote to memory of 3656 4960 2sun.exe 87 PID 4960 wrote to memory of 3656 4960 2sun.exe 87 PID 4960 wrote to memory of 3656 4960 2sun.exe 87 PID 4960 wrote to memory of 3656 4960 2sun.exe 87 PID 4960 wrote to memory of 3656 4960 2sun.exe 87 PID 4960 wrote to memory of 3656 4960 2sun.exe 87 PID 4960 wrote to memory of 4876 4960 2sun.exe 88 PID 4960 wrote to memory of 4876 4960 2sun.exe 88 PID 4960 wrote to memory of 4876 4960 2sun.exe 88 PID 4960 wrote to memory of 4876 4960 2sun.exe 88 PID 4960 wrote to memory of 4876 4960 2sun.exe 88 PID 4960 wrote to memory of 4876 4960 2sun.exe 88 PID 4960 wrote to memory of 4876 4960 2sun.exe 88 PID 4960 wrote to memory of 4876 4960 2sun.exe 88 PID 4960 wrote to memory of 2892 4960 2sun.exe 89 PID 4960 wrote to memory of 2892 4960 2sun.exe 89 PID 4960 wrote to memory of 2892 4960 2sun.exe 89 PID 4960 wrote to memory of 2892 4960 2sun.exe 89 PID 4960 wrote to memory of 2892 4960 2sun.exe 89 PID 4960 wrote to memory of 2892 4960 2sun.exe 89 PID 4960 wrote to memory of 2892 4960 2sun.exe 89 PID 4960 wrote to memory of 2892 4960 2sun.exe 89 PID 4960 wrote to memory of 456 4960 2sun.exe 90 PID 4960 wrote to memory of 456 4960 2sun.exe 90 PID 4960 wrote to memory of 456 4960 2sun.exe 90 PID 4960 wrote to memory of 456 4960 2sun.exe 90 PID 4960 wrote to memory of 456 4960 2sun.exe 90 PID 4960 wrote to memory of 456 4960 2sun.exe 90 PID 4960 wrote to memory of 456 4960 2sun.exe 90 PID 4960 wrote to memory of 456 4960 2sun.exe 90 PID 4960 wrote to memory of 3324 4960 2sun.exe 91 PID 4960 wrote to memory of 3324 4960 2sun.exe 91 PID 4960 wrote to memory of 3324 4960 2sun.exe 91 PID 4960 wrote to memory of 3324 4960 2sun.exe 91 PID 4824 wrote to memory of 3488 4824 jeuac.exe 85 PID 4824 wrote to memory of 3488 4824 jeuac.exe 85 PID 2040 wrote to memory of 3528 2040 181a0d1578b0434ef24edde5a17ec12299ffbbf46b1a57e65dad4b71818c9ccf.exe 96 PID 2040 wrote to memory of 3528 2040 181a0d1578b0434ef24edde5a17ec12299ffbbf46b1a57e65dad4b71818c9ccf.exe 96 PID 2040 wrote to memory of 3528 2040 181a0d1578b0434ef24edde5a17ec12299ffbbf46b1a57e65dad4b71818c9ccf.exe 96 PID 3528 wrote to memory of 3100 3528 3sun.exe 97 PID 3528 wrote to memory of 3100 3528 3sun.exe 97 PID 3100 wrote to memory of 2576 3100 X 51 PID 3528 wrote to memory of 1316 3528 3sun.exe 98 PID 3528 wrote to memory of 1316 3528 3sun.exe 98 PID 3528 wrote to memory of 1316 3528 3sun.exe 98 PID 3528 wrote to memory of 1316 3528 3sun.exe 98 PID 2040 wrote to memory of 4544 2040 181a0d1578b0434ef24edde5a17ec12299ffbbf46b1a57e65dad4b71818c9ccf.exe 100
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\181a0d1578b0434ef24edde5a17ec12299ffbbf46b1a57e65dad4b71818c9ccf.exe"C:\Users\Admin\AppData\Local\Temp\181a0d1578b0434ef24edde5a17ec12299ffbbf46b1a57e65dad4b71818c9ccf.exe"2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\JB3O2vP3.exeC:\Users\Admin\JB3O2vP3.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\jeuac.exe"C:\Users\Admin\jeuac.exe"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4824
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del JB3O2vP3.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3488
-
-
-
-
C:\Users\Admin\2sun.exeC:\Users\Admin\2sun.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\2sun.exe"C:\Users\Admin\2sun.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3656
-
-
C:\Users\Admin\2sun.exe"C:\Users\Admin\2sun.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4876
-
-
C:\Users\Admin\2sun.exe"C:\Users\Admin\2sun.exe"4⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:2892
-
-
C:\Users\Admin\2sun.exe"C:\Users\Admin\2sun.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:456
-
-
C:\Users\Admin\2sun.exe"C:\Users\Admin\2sun.exe"4⤵
- Executes dropped EXE
PID:3324 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 805⤵
- Program crash
PID:3364
-
-
-
-
C:\Users\Admin\3sun.exeC:\Users\Admin\3sun.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\2aebb42b\X*0*bc*6693b3fb*31.193.3.240:534⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3100
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:1316
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 181a0d1578b0434ef24edde5a17ec12299ffbbf46b1a57e65dad4b71818c9ccf.exe3⤵PID:4544
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2336
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3324 -ip 33241⤵PID:2004
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD5cba16c1a489b02c4ff5720c68f35f787
SHA1bd3d817f02e1492d246c067a6ddf3e0ec33d86c3
SHA2560235b18287b0a3833cb877713019c2679a7699b2c848b16bfdf50244f8556e80
SHA51200740a1e2bd2bba0f4f2486914fe1c885064d5dc6389561697e357a354e8cdc6707f4bd542c02179020ef69c6d9f1d3503eaf0111bb9c1eba1a64a194cb9c345
-
Filesize
128KB
MD5cba16c1a489b02c4ff5720c68f35f787
SHA1bd3d817f02e1492d246c067a6ddf3e0ec33d86c3
SHA2560235b18287b0a3833cb877713019c2679a7699b2c848b16bfdf50244f8556e80
SHA51200740a1e2bd2bba0f4f2486914fe1c885064d5dc6389561697e357a354e8cdc6707f4bd542c02179020ef69c6d9f1d3503eaf0111bb9c1eba1a64a194cb9c345
-
Filesize
128KB
MD5cba16c1a489b02c4ff5720c68f35f787
SHA1bd3d817f02e1492d246c067a6ddf3e0ec33d86c3
SHA2560235b18287b0a3833cb877713019c2679a7699b2c848b16bfdf50244f8556e80
SHA51200740a1e2bd2bba0f4f2486914fe1c885064d5dc6389561697e357a354e8cdc6707f4bd542c02179020ef69c6d9f1d3503eaf0111bb9c1eba1a64a194cb9c345
-
Filesize
128KB
MD5cba16c1a489b02c4ff5720c68f35f787
SHA1bd3d817f02e1492d246c067a6ddf3e0ec33d86c3
SHA2560235b18287b0a3833cb877713019c2679a7699b2c848b16bfdf50244f8556e80
SHA51200740a1e2bd2bba0f4f2486914fe1c885064d5dc6389561697e357a354e8cdc6707f4bd542c02179020ef69c6d9f1d3503eaf0111bb9c1eba1a64a194cb9c345
-
Filesize
128KB
MD5cba16c1a489b02c4ff5720c68f35f787
SHA1bd3d817f02e1492d246c067a6ddf3e0ec33d86c3
SHA2560235b18287b0a3833cb877713019c2679a7699b2c848b16bfdf50244f8556e80
SHA51200740a1e2bd2bba0f4f2486914fe1c885064d5dc6389561697e357a354e8cdc6707f4bd542c02179020ef69c6d9f1d3503eaf0111bb9c1eba1a64a194cb9c345
-
Filesize
128KB
MD5cba16c1a489b02c4ff5720c68f35f787
SHA1bd3d817f02e1492d246c067a6ddf3e0ec33d86c3
SHA2560235b18287b0a3833cb877713019c2679a7699b2c848b16bfdf50244f8556e80
SHA51200740a1e2bd2bba0f4f2486914fe1c885064d5dc6389561697e357a354e8cdc6707f4bd542c02179020ef69c6d9f1d3503eaf0111bb9c1eba1a64a194cb9c345
-
Filesize
128KB
MD5cba16c1a489b02c4ff5720c68f35f787
SHA1bd3d817f02e1492d246c067a6ddf3e0ec33d86c3
SHA2560235b18287b0a3833cb877713019c2679a7699b2c848b16bfdf50244f8556e80
SHA51200740a1e2bd2bba0f4f2486914fe1c885064d5dc6389561697e357a354e8cdc6707f4bd542c02179020ef69c6d9f1d3503eaf0111bb9c1eba1a64a194cb9c345
-
Filesize
278KB
MD5345cbbd3a56a313f804b997f8cbecb2b
SHA19978d6f5bca8ab1486573ff073661e7cfd40c365
SHA256492c8cf86fcfa07fcf5716b17593a9ec265c5aa919c2fe563a34ece1580b055c
SHA5125cdb8b00ab0d653a34b3d1b2871ebeb0badfe223779dce775adf00d577a2931f77c1e6d92cda719e32a8683f6f729179f128472efdf6ec0ac18cbdbcfbbc237d
-
Filesize
278KB
MD5345cbbd3a56a313f804b997f8cbecb2b
SHA19978d6f5bca8ab1486573ff073661e7cfd40c365
SHA256492c8cf86fcfa07fcf5716b17593a9ec265c5aa919c2fe563a34ece1580b055c
SHA5125cdb8b00ab0d653a34b3d1b2871ebeb0badfe223779dce775adf00d577a2931f77c1e6d92cda719e32a8683f6f729179f128472efdf6ec0ac18cbdbcfbbc237d
-
Filesize
38KB
MD572de2dadaf875e2fd7614e100419033c
SHA15f17c5330e91a42daa9ff24c4aa602bd1a72bf6e
SHA256c44993768a4dc5a58ddbfc9cb05ce2a7d3a0a56be45643d70a72bcf811b6c381
SHA512e2520a53326a7d3b056e65d0cf60e9d823ffb34ca026cdddc7ea3a714f8396c53c37e13a887fc86a7dd7076c97fdfad53c3f5a68342ebc1bdec948c76bda8df3
-
Filesize
38KB
MD572de2dadaf875e2fd7614e100419033c
SHA15f17c5330e91a42daa9ff24c4aa602bd1a72bf6e
SHA256c44993768a4dc5a58ddbfc9cb05ce2a7d3a0a56be45643d70a72bcf811b6c381
SHA512e2520a53326a7d3b056e65d0cf60e9d823ffb34ca026cdddc7ea3a714f8396c53c37e13a887fc86a7dd7076c97fdfad53c3f5a68342ebc1bdec948c76bda8df3
-
Filesize
228KB
MD5290d691efc05b13247d2f6d8952a215b
SHA1a885524eae321c2d025dd8e2fe4c8dd76dfb0ca0
SHA25643b951fb64328c15a0592d228e90f05be14b4f18a902c35b5c0451020e1d82be
SHA5128dfdcdd93b47db1b490a80fd1c483e5f10d18d782f34562bf7313039040c69878fb1d6ad22f1b3d6e48dcc8db507c430f11b1a976b48f9cd1769400fba4c150e
-
Filesize
228KB
MD5290d691efc05b13247d2f6d8952a215b
SHA1a885524eae321c2d025dd8e2fe4c8dd76dfb0ca0
SHA25643b951fb64328c15a0592d228e90f05be14b4f18a902c35b5c0451020e1d82be
SHA5128dfdcdd93b47db1b490a80fd1c483e5f10d18d782f34562bf7313039040c69878fb1d6ad22f1b3d6e48dcc8db507c430f11b1a976b48f9cd1769400fba4c150e
-
Filesize
228KB
MD5a112e62c3a277db5fa1eabe33c3ed65a
SHA13d6c483dd1f49b7efd58c28a10495519db96115d
SHA2567b88dabd00eb735dec983892087faa8fc0d74a90cb00d02d72818f1c8e6b0a61
SHA512008c81e79b75359911decd8f3103a45498870d2ac56d4cf04bc9cf159fe6255360d0646a0e1f59ab0e6629810ac43811386b7807b977760a91518a1c7fc7c87e
-
Filesize
228KB
MD5a112e62c3a277db5fa1eabe33c3ed65a
SHA13d6c483dd1f49b7efd58c28a10495519db96115d
SHA2567b88dabd00eb735dec983892087faa8fc0d74a90cb00d02d72818f1c8e6b0a61
SHA512008c81e79b75359911decd8f3103a45498870d2ac56d4cf04bc9cf159fe6255360d0646a0e1f59ab0e6629810ac43811386b7807b977760a91518a1c7fc7c87e