Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 14:18
Behavioral task
behavioral1
Sample
0e6a25cbc84543de24e066cf5a3c9ba889dc2e37206b75d096a9c747352aa0d0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0e6a25cbc84543de24e066cf5a3c9ba889dc2e37206b75d096a9c747352aa0d0.exe
Resource
win10v2004-20220812-en
General
-
Target
0e6a25cbc84543de24e066cf5a3c9ba889dc2e37206b75d096a9c747352aa0d0.exe
-
Size
333KB
-
MD5
0ed013ddaf331351de0404c0a9380a40
-
SHA1
a1ff6bf180f444cdbc1a584b75791f8eec075da3
-
SHA256
0e6a25cbc84543de24e066cf5a3c9ba889dc2e37206b75d096a9c747352aa0d0
-
SHA512
4a93a1c5eaeb55f2178c4f70d37c5b5a34545e761903a6bf6741d9947d2aa9f8a9bbe07a38cb8b15dc74eec2c07e2848085595e3a37b89249030568a9406d32b
-
SSDEEP
6144:lYnenaO+ofOSaynZhXyepWZY5tGVcgjSYVaOLpV/FtoZDEqHkU:lpnaOl25rY5tGVcKSYLzoZwqEU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1792 jlguaji.exe -
resource yara_rule behavioral2/memory/1180-132-0x0000000000400000-0x000000000050A76A-memory.dmp upx behavioral2/memory/1180-133-0x0000000000400000-0x000000000050A76A-memory.dmp upx behavioral2/memory/1180-138-0x0000000000400000-0x000000000050A76A-memory.dmp upx behavioral2/memory/1180-139-0x0000000000400000-0x000000000050A76A-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run jlguaji.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\urlspace = "C:\\Users\\Admin\\AppData\\Roaming\\Spiritsoft\\urlspirit\\jlguaji.exe -h" jlguaji.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 jlguaji.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz jlguaji.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1792 jlguaji.exe 1792 jlguaji.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 1792 jlguaji.exe 1792 jlguaji.exe 1792 jlguaji.exe 1792 jlguaji.exe 1792 jlguaji.exe 1792 jlguaji.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 1792 jlguaji.exe 1792 jlguaji.exe 1792 jlguaji.exe 1792 jlguaji.exe 1792 jlguaji.exe 1792 jlguaji.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1792 jlguaji.exe 1792 jlguaji.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1180 wrote to memory of 1792 1180 0e6a25cbc84543de24e066cf5a3c9ba889dc2e37206b75d096a9c747352aa0d0.exe 81 PID 1180 wrote to memory of 1792 1180 0e6a25cbc84543de24e066cf5a3c9ba889dc2e37206b75d096a9c747352aa0d0.exe 81 PID 1180 wrote to memory of 1792 1180 0e6a25cbc84543de24e066cf5a3c9ba889dc2e37206b75d096a9c747352aa0d0.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e6a25cbc84543de24e066cf5a3c9ba889dc2e37206b75d096a9c747352aa0d0.exe"C:\Users\Admin\AppData\Local\Temp\0e6a25cbc84543de24e066cf5a3c9ba889dc2e37206b75d096a9c747352aa0d0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Roaming\Spiritsoft\urlspirit\jlguaji.exeC:\Users\Admin\AppData\Roaming\Spiritsoft\urlspirit\jlguaji.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1792
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD5e93a0f3c1593c2e545523e6e588a2cf5
SHA1b09546b5cec5c5b99a32d9ce2dec5a71fa0da242
SHA256550711d76522438658aac785865ae1981c37d2b3f5bc8ab5333aaec5a7145389
SHA512c8780953a6d58ff5ee78749e603c17b76b2d279438cb683bacfb6c00f49eeb594f1d8139cfe825b9592be48e70694a083347df58a6b9c3c887d18e5b6e3c5021
-
Filesize
645KB
MD5425dcd2af9e277b88e245887f84e63e1
SHA14449eacc382578ca8174129481d723284320c9b4
SHA2567c52029eaaf76cc27b5640ca0b3a876e8efb17a7607cbe2c663a4a19defc7f54
SHA5122b92bf9b1c5700920c1ecd04c3d13380f427697c8d3b4a38440bb124d06f9743dc5d18e7bc65255ea8299a5c33289f29a315cf7bf6f89fd64334ecc7c8fd3ef3
-
Filesize
645KB
MD5425dcd2af9e277b88e245887f84e63e1
SHA14449eacc382578ca8174129481d723284320c9b4
SHA2567c52029eaaf76cc27b5640ca0b3a876e8efb17a7607cbe2c663a4a19defc7f54
SHA5122b92bf9b1c5700920c1ecd04c3d13380f427697c8d3b4a38440bb124d06f9743dc5d18e7bc65255ea8299a5c33289f29a315cf7bf6f89fd64334ecc7c8fd3ef3
-
Filesize
380B
MD5b5423b660ccd59a122f51b9cf44d16c4
SHA1df04d91ed9cf6758cd4b3370a24dee4d057c1d49
SHA2568154d566e1d816740c4a6222ffa336a6f3861b37123b3e1566e834936bc5ce13
SHA512622f3cc1b60115d0a01e6aa311764afc6900a68d686c6abd9513de5ccd79b321fa412400aba15e755add335977a5194f061b3ef60b6bb479d0033356cdb8b969
-
Filesize
1KB
MD54dd2cf4196f898b41f5bf90d43681630
SHA1d7bba347ddacedf7387d70cfa15f7b3e788b2307
SHA2564544ecac7841fa425936937c4e5162d5cfa73a87a17ed2f5c2eb44534da6afe7
SHA512e81a971d754b27f2c1f1c63471edec16b141f5800411ef53866f0f858cb28cb3eb8169ad77798ab3c09567d98f7d5c4f37eaecdaac464ebf024dfeced423e232