Analysis
-
max time kernel
149s -
max time network
174s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 10:31
Static task
static1
Behavioral task
behavioral1
Sample
c8dabb02e76b69c233efb94f9601a7433bc47d2d1e28457f355978d5b8b44397.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c8dabb02e76b69c233efb94f9601a7433bc47d2d1e28457f355978d5b8b44397.exe
Resource
win10v2004-20220812-en
General
-
Target
c8dabb02e76b69c233efb94f9601a7433bc47d2d1e28457f355978d5b8b44397.exe
-
Size
452KB
-
MD5
08628adebf2c795b707c98392674c5e6
-
SHA1
687ba217dd3dc9db041c185c8e98d596ae3d3893
-
SHA256
c8dabb02e76b69c233efb94f9601a7433bc47d2d1e28457f355978d5b8b44397
-
SHA512
41bf6cc5ff3f024c8e910d9dd2bbe1abb652e9ea738653df47122c55e55c4e03f7f5d60d5a89a5f0bcebc6295ef5e23052b7f0481f2de85ab9eff1564b547eab
-
SSDEEP
12288:KFfVNQLBYRTfSkon6LiJyk49XW1K3DnsBbp:eVe8fmwiJ8W4Dsz
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 836 jlguaji.exe -
Loads dropped DLL 2 IoCs
pid Process 1932 c8dabb02e76b69c233efb94f9601a7433bc47d2d1e28457f355978d5b8b44397.exe 1932 c8dabb02e76b69c233efb94f9601a7433bc47d2d1e28457f355978d5b8b44397.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run jlguaji.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\urlspace = "C:\\Users\\Admin\\AppData\\Roaming\\Spiritsoft\\urlspirit\\jlguaji.exe -h" jlguaji.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 c8dabb02e76b69c233efb94f9601a7433bc47d2d1e28457f355978d5b8b44397.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 jlguaji.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz jlguaji.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main jlguaji.exe -
Modifies registry class 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ c8dabb02e76b69c233efb94f9601a7433bc47d2d1e28457f355978d5b8b44397.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" c8dabb02e76b69c233efb94f9601a7433bc47d2d1e28457f355978d5b8b44397.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key c8dabb02e76b69c233efb94f9601a7433bc47d2d1e28457f355978d5b8b44397.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 836 jlguaji.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 836 jlguaji.exe 836 jlguaji.exe 836 jlguaji.exe 836 jlguaji.exe 836 jlguaji.exe 836 jlguaji.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 836 jlguaji.exe 836 jlguaji.exe 836 jlguaji.exe 836 jlguaji.exe 836 jlguaji.exe 836 jlguaji.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 836 jlguaji.exe 836 jlguaji.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1932 wrote to memory of 836 1932 c8dabb02e76b69c233efb94f9601a7433bc47d2d1e28457f355978d5b8b44397.exe 27 PID 1932 wrote to memory of 836 1932 c8dabb02e76b69c233efb94f9601a7433bc47d2d1e28457f355978d5b8b44397.exe 27 PID 1932 wrote to memory of 836 1932 c8dabb02e76b69c233efb94f9601a7433bc47d2d1e28457f355978d5b8b44397.exe 27 PID 1932 wrote to memory of 836 1932 c8dabb02e76b69c233efb94f9601a7433bc47d2d1e28457f355978d5b8b44397.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8dabb02e76b69c233efb94f9601a7433bc47d2d1e28457f355978d5b8b44397.exe"C:\Users\Admin\AppData\Local\Temp\c8dabb02e76b69c233efb94f9601a7433bc47d2d1e28457f355978d5b8b44397.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Roaming\Spiritsoft\urlspirit\jlguaji.exeC:\Users\Admin\AppData\Roaming\Spiritsoft\urlspirit\jlguaji.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:836
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD5e93a0f3c1593c2e545523e6e588a2cf5
SHA1b09546b5cec5c5b99a32d9ce2dec5a71fa0da242
SHA256550711d76522438658aac785865ae1981c37d2b3f5bc8ab5333aaec5a7145389
SHA512c8780953a6d58ff5ee78749e603c17b76b2d279438cb683bacfb6c00f49eeb594f1d8139cfe825b9592be48e70694a083347df58a6b9c3c887d18e5b6e3c5021
-
Filesize
645KB
MD5425dcd2af9e277b88e245887f84e63e1
SHA14449eacc382578ca8174129481d723284320c9b4
SHA2567c52029eaaf76cc27b5640ca0b3a876e8efb17a7607cbe2c663a4a19defc7f54
SHA5122b92bf9b1c5700920c1ecd04c3d13380f427697c8d3b4a38440bb124d06f9743dc5d18e7bc65255ea8299a5c33289f29a315cf7bf6f89fd64334ecc7c8fd3ef3
-
Filesize
645KB
MD5425dcd2af9e277b88e245887f84e63e1
SHA14449eacc382578ca8174129481d723284320c9b4
SHA2567c52029eaaf76cc27b5640ca0b3a876e8efb17a7607cbe2c663a4a19defc7f54
SHA5122b92bf9b1c5700920c1ecd04c3d13380f427697c8d3b4a38440bb124d06f9743dc5d18e7bc65255ea8299a5c33289f29a315cf7bf6f89fd64334ecc7c8fd3ef3
-
Filesize
380B
MD57eba6f8bd2aed7d0b60bcbec6159c6f8
SHA1b13f8474ed7c4048646ed39585d865228f62027d
SHA2567d39c476eaf974b2e2a48cdea3340f2416f02804724e8b551e4ac25e8ce37784
SHA512b93be6a16eb199db94bbcb6f0f20a401830c6f45311c48fd00070a2dd67f70cc01324ba64f3e7460042fb4e92ff2595fb7407409733cdfefea001795aafb9cfd
-
Filesize
1KB
MD54dd2cf4196f898b41f5bf90d43681630
SHA1d7bba347ddacedf7387d70cfa15f7b3e788b2307
SHA2564544ecac7841fa425936937c4e5162d5cfa73a87a17ed2f5c2eb44534da6afe7
SHA512e81a971d754b27f2c1f1c63471edec16b141f5800411ef53866f0f858cb28cb3eb8169ad77798ab3c09567d98f7d5c4f37eaecdaac464ebf024dfeced423e232
-
Filesize
645KB
MD5425dcd2af9e277b88e245887f84e63e1
SHA14449eacc382578ca8174129481d723284320c9b4
SHA2567c52029eaaf76cc27b5640ca0b3a876e8efb17a7607cbe2c663a4a19defc7f54
SHA5122b92bf9b1c5700920c1ecd04c3d13380f427697c8d3b4a38440bb124d06f9743dc5d18e7bc65255ea8299a5c33289f29a315cf7bf6f89fd64334ecc7c8fd3ef3
-
Filesize
645KB
MD5425dcd2af9e277b88e245887f84e63e1
SHA14449eacc382578ca8174129481d723284320c9b4
SHA2567c52029eaaf76cc27b5640ca0b3a876e8efb17a7607cbe2c663a4a19defc7f54
SHA5122b92bf9b1c5700920c1ecd04c3d13380f427697c8d3b4a38440bb124d06f9743dc5d18e7bc65255ea8299a5c33289f29a315cf7bf6f89fd64334ecc7c8fd3ef3