Analysis
-
max time kernel
150s -
max time network
114s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
21/10/2022, 05:15
Behavioral task
behavioral1
Sample
83bf4109eeb38323e2262a7f8d95f0c8bc7088baca4fc635706c1e0aaadb7841.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
83bf4109eeb38323e2262a7f8d95f0c8bc7088baca4fc635706c1e0aaadb7841.exe
Resource
win10v2004-20220901-en
General
-
Target
83bf4109eeb38323e2262a7f8d95f0c8bc7088baca4fc635706c1e0aaadb7841.exe
-
Size
229KB
-
MD5
28e1e8cab29f84112839f9fe891bef22
-
SHA1
e0910c851fc8489615bebadd3611061d38edb323
-
SHA256
83bf4109eeb38323e2262a7f8d95f0c8bc7088baca4fc635706c1e0aaadb7841
-
SHA512
9a8617617e1377ad931ec41d164b86a2114b192fd68a352871fe97710b5d4e578b6084f358b89f849e18d13e3fe868c7c659992434b0ad0191d2ceeffc053b8d
-
SSDEEP
3072:D5VvdQC6IVXxGmk/2FJEcM4qN+y6wJaQXXgctlnXNCFbdgOSKivew:D1rH4/2jEhTN+ydfXzl9CFbfS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 996 Jseloa.exe -
resource yara_rule behavioral1/files/0x0007000000015648-57.dat upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run Jseloa.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\C2MJB7NYRU = "C:\\Windows\\Jseloa.exe" Jseloa.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Jseloa.exe 83bf4109eeb38323e2262a7f8d95f0c8bc7088baca4fc635706c1e0aaadb7841.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 83bf4109eeb38323e2262a7f8d95f0c8bc7088baca4fc635706c1e0aaadb7841.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 83bf4109eeb38323e2262a7f8d95f0c8bc7088baca4fc635706c1e0aaadb7841.exe File created C:\Windows\Jseloa.exe 83bf4109eeb38323e2262a7f8d95f0c8bc7088baca4fc635706c1e0aaadb7841.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main Jseloa.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\International Jseloa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe 996 Jseloa.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1376 wrote to memory of 996 1376 83bf4109eeb38323e2262a7f8d95f0c8bc7088baca4fc635706c1e0aaadb7841.exe 26 PID 1376 wrote to memory of 996 1376 83bf4109eeb38323e2262a7f8d95f0c8bc7088baca4fc635706c1e0aaadb7841.exe 26 PID 1376 wrote to memory of 996 1376 83bf4109eeb38323e2262a7f8d95f0c8bc7088baca4fc635706c1e0aaadb7841.exe 26 PID 1376 wrote to memory of 996 1376 83bf4109eeb38323e2262a7f8d95f0c8bc7088baca4fc635706c1e0aaadb7841.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\83bf4109eeb38323e2262a7f8d95f0c8bc7088baca4fc635706c1e0aaadb7841.exe"C:\Users\Admin\AppData\Local\Temp\83bf4109eeb38323e2262a7f8d95f0c8bc7088baca4fc635706c1e0aaadb7841.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\Jseloa.exeC:\Windows\Jseloa.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:996
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229KB
MD528e1e8cab29f84112839f9fe891bef22
SHA1e0910c851fc8489615bebadd3611061d38edb323
SHA25683bf4109eeb38323e2262a7f8d95f0c8bc7088baca4fc635706c1e0aaadb7841
SHA5129a8617617e1377ad931ec41d164b86a2114b192fd68a352871fe97710b5d4e578b6084f358b89f849e18d13e3fe868c7c659992434b0ad0191d2ceeffc053b8d
-
Filesize
408B
MD59206fcc2a7e67229e13585aa2dd22185
SHA1d8552dd1c3412feb1e22c110bc5c56aedf84c3ad
SHA25647c9db4eb861112c786a65e401ccabd1db7ab5c96979e60f90ba132075f817e3
SHA5125d2f3e92ee1e98a6a2ba1d7bdedba3f7a0a98d878dc55c1d84fdb7e3f1ca75d69ff51ca623c0ab16ec0aaeae966541541e0c234b290f693f915eb123c7077e75