Analysis
-
max time kernel
300s -
max time network
301s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
31-10-2022 02:10
Static task
static1
Behavioral task
behavioral1
Sample
Xjpclient.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Xjpclient.exe
Resource
win10v2004-20220812-en
General
-
Target
Xjpclient.exe
-
Size
2.7MB
-
MD5
7ccf1daeb4ddd980db87cbaad63e68a6
-
SHA1
bc7eebe2ec92ff358991773fcc7bd3a9c4fadf2e
-
SHA256
fcb778c9acf8dfc5b52941414b4e9d11cec1a10e360dffccdff948198896d5cd
-
SHA512
f61ec6b5f55b1c143fec7e9f229159d668fe166a78463659d88ef64ccf687a2cbc36a8d0ab9916e2a695e295584779ce63e3d801d1fc364d9ede44a275a8ce39
-
SSDEEP
49152:QeencSz4IR3yHM8g8SpxRVDZNM1JBmxOztaBVjNYc3D0nhCZiaGwZ:SHz42CHNgnV3UJBTpch3oMiaGC
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 536 Xjpclient.exe 2040 Xjpclient.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe 2040 Xjpclient.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 536 Xjpclient.exe Token: SeDebugPrivilege 2040 Xjpclient.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Xjpclient.exe"C:\Users\Admin\AppData\Local\Temp\Xjpclient.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:536
-
C:\Users\Admin\AppData\Local\Temp\Xjpclient.exeC:\Users\Admin\AppData\Local\Temp\Xjpclient.exe -s1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2040
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD59b42ef6d767d0b7759bc10d1da2e692a
SHA1c2a9e59971898681a08a2775131ebeef4c37ef89
SHA256a0b11444c5913bc048c2f97b670cc801176df17565c48d6e7a30fef651ca8426
SHA5124557575036fae0a04ad8855b19df768aa40dca2da3c2c486a76875355f7b9cc624d280b9c5c7db03cdc533e573baf35684f7846017ed384f8b731ac8dd23c2bf
-
Filesize
1.9MB
MD59b42ef6d767d0b7759bc10d1da2e692a
SHA1c2a9e59971898681a08a2775131ebeef4c37ef89
SHA256a0b11444c5913bc048c2f97b670cc801176df17565c48d6e7a30fef651ca8426
SHA5124557575036fae0a04ad8855b19df768aa40dca2da3c2c486a76875355f7b9cc624d280b9c5c7db03cdc533e573baf35684f7846017ed384f8b731ac8dd23c2bf