Analysis
-
max time kernel
112s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 15:07
Static task
static1
Behavioral task
behavioral1
Sample
de7f87d3ee5f28fedabfbf872096c09fb42a2a5fc4e21eb687003220fe97bcc4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
de7f87d3ee5f28fedabfbf872096c09fb42a2a5fc4e21eb687003220fe97bcc4.exe
Resource
win10v2004-20220812-en
General
-
Target
de7f87d3ee5f28fedabfbf872096c09fb42a2a5fc4e21eb687003220fe97bcc4.exe
-
Size
76KB
-
MD5
8269b2e99816c84bf9030391c76bed00
-
SHA1
d591faa331b12582670fd396461c969d58f6baa7
-
SHA256
de7f87d3ee5f28fedabfbf872096c09fb42a2a5fc4e21eb687003220fe97bcc4
-
SHA512
ff073ed550ad2d2f1ce85f980e05ad9bbbae81a2705ceda6ec8f216edaa34eb6ef89f2b26c3f7595d1b2fd157bfeb05798388ff3b43f3c6b4d8f507652cc0bad
-
SSDEEP
1536:IJquUaZikaSckp8w9jFmz8POOxfnBIIMPkkWr37/XcLs:sukdSw9jaTOpGbyv/Xcg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3636 Xjedea.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run de7f87d3ee5f28fedabfbf872096c09fb42a2a5fc4e21eb687003220fe97bcc4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Xjedea = "C:\\Users\\Admin\\AppData\\Roaming\\Xjedea.exe" de7f87d3ee5f28fedabfbf872096c09fb42a2a5fc4e21eb687003220fe97bcc4.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3680 set thread context of 3364 3680 de7f87d3ee5f28fedabfbf872096c09fb42a2a5fc4e21eb687003220fe97bcc4.exe 90 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3364 de7f87d3ee5f28fedabfbf872096c09fb42a2a5fc4e21eb687003220fe97bcc4.exe 3364 de7f87d3ee5f28fedabfbf872096c09fb42a2a5fc4e21eb687003220fe97bcc4.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3680 wrote to memory of 3364 3680 de7f87d3ee5f28fedabfbf872096c09fb42a2a5fc4e21eb687003220fe97bcc4.exe 90 PID 3680 wrote to memory of 3364 3680 de7f87d3ee5f28fedabfbf872096c09fb42a2a5fc4e21eb687003220fe97bcc4.exe 90 PID 3680 wrote to memory of 3364 3680 de7f87d3ee5f28fedabfbf872096c09fb42a2a5fc4e21eb687003220fe97bcc4.exe 90 PID 3680 wrote to memory of 3364 3680 de7f87d3ee5f28fedabfbf872096c09fb42a2a5fc4e21eb687003220fe97bcc4.exe 90 PID 3680 wrote to memory of 3364 3680 de7f87d3ee5f28fedabfbf872096c09fb42a2a5fc4e21eb687003220fe97bcc4.exe 90 PID 3680 wrote to memory of 3364 3680 de7f87d3ee5f28fedabfbf872096c09fb42a2a5fc4e21eb687003220fe97bcc4.exe 90 PID 3680 wrote to memory of 3364 3680 de7f87d3ee5f28fedabfbf872096c09fb42a2a5fc4e21eb687003220fe97bcc4.exe 90 PID 3680 wrote to memory of 3364 3680 de7f87d3ee5f28fedabfbf872096c09fb42a2a5fc4e21eb687003220fe97bcc4.exe 90 PID 3680 wrote to memory of 3364 3680 de7f87d3ee5f28fedabfbf872096c09fb42a2a5fc4e21eb687003220fe97bcc4.exe 90 PID 3364 wrote to memory of 3636 3364 de7f87d3ee5f28fedabfbf872096c09fb42a2a5fc4e21eb687003220fe97bcc4.exe 91 PID 3364 wrote to memory of 3636 3364 de7f87d3ee5f28fedabfbf872096c09fb42a2a5fc4e21eb687003220fe97bcc4.exe 91 PID 3364 wrote to memory of 3636 3364 de7f87d3ee5f28fedabfbf872096c09fb42a2a5fc4e21eb687003220fe97bcc4.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\de7f87d3ee5f28fedabfbf872096c09fb42a2a5fc4e21eb687003220fe97bcc4.exe"C:\Users\Admin\AppData\Local\Temp\de7f87d3ee5f28fedabfbf872096c09fb42a2a5fc4e21eb687003220fe97bcc4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\de7f87d3ee5f28fedabfbf872096c09fb42a2a5fc4e21eb687003220fe97bcc4.exe"C:\Users\Admin\AppData\Local\Temp\de7f87d3ee5f28fedabfbf872096c09fb42a2a5fc4e21eb687003220fe97bcc4.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Users\Admin\AppData\Roaming\Xjedea.exe"C:\Users\Admin\AppData\Roaming\Xjedea.exe"3⤵
- Executes dropped EXE
PID:3636
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD58269b2e99816c84bf9030391c76bed00
SHA1d591faa331b12582670fd396461c969d58f6baa7
SHA256de7f87d3ee5f28fedabfbf872096c09fb42a2a5fc4e21eb687003220fe97bcc4
SHA512ff073ed550ad2d2f1ce85f980e05ad9bbbae81a2705ceda6ec8f216edaa34eb6ef89f2b26c3f7595d1b2fd157bfeb05798388ff3b43f3c6b4d8f507652cc0bad
-
Filesize
76KB
MD58269b2e99816c84bf9030391c76bed00
SHA1d591faa331b12582670fd396461c969d58f6baa7
SHA256de7f87d3ee5f28fedabfbf872096c09fb42a2a5fc4e21eb687003220fe97bcc4
SHA512ff073ed550ad2d2f1ce85f980e05ad9bbbae81a2705ceda6ec8f216edaa34eb6ef89f2b26c3f7595d1b2fd157bfeb05798388ff3b43f3c6b4d8f507652cc0bad