Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23/11/2022, 22:54
Static task
static1
Behavioral task
behavioral1
Sample
2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe
Resource
win10v2004-20221111-en
General
-
Target
2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe
-
Size
312KB
-
MD5
07c292f92880addb522d590e7348dad5
-
SHA1
d7abd9be2cc525ec8ae0c2ba40be8ced272a295d
-
SHA256
2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95
-
SHA512
cd1d709494816ec17b89a99ace6336c23b5f82af32c8c95c26bbfbb375ce4676cc8f8581ca56e5d4398bd27a64481bb2847604e84721d6092b6f91e8e6f6d263
-
SSDEEP
6144:doFq9rmpx4faFYRYYWE5MUOJfJZHbj4njCxiyLldZxfsKZTLpE:mqqQSFYRYYWn3l0WxiyheKJL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1668 jPjCcMlPoFi01804.exe -
Loads dropped DLL 2 IoCs
pid Process 1672 2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe 1672 2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\jPjCcMlPoFi01804 = "C:\\ProgramData\\jPjCcMlPoFi01804\\jPjCcMlPoFi01804.exe" jPjCcMlPoFi01804.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: jPjCcMlPoFi01804.exe File opened (read-only) \??\M: jPjCcMlPoFi01804.exe File opened (read-only) \??\Z: jPjCcMlPoFi01804.exe File opened (read-only) \??\S: jPjCcMlPoFi01804.exe File opened (read-only) \??\H: jPjCcMlPoFi01804.exe File opened (read-only) \??\K: jPjCcMlPoFi01804.exe File opened (read-only) \??\L: jPjCcMlPoFi01804.exe File opened (read-only) \??\N: jPjCcMlPoFi01804.exe File opened (read-only) \??\O: jPjCcMlPoFi01804.exe File opened (read-only) \??\Q: jPjCcMlPoFi01804.exe File opened (read-only) \??\R: jPjCcMlPoFi01804.exe File opened (read-only) \??\V: jPjCcMlPoFi01804.exe File opened (read-only) \??\Y: jPjCcMlPoFi01804.exe File opened (read-only) \??\F: jPjCcMlPoFi01804.exe File opened (read-only) \??\P: jPjCcMlPoFi01804.exe File opened (read-only) \??\T: jPjCcMlPoFi01804.exe File opened (read-only) \??\W: jPjCcMlPoFi01804.exe File opened (read-only) \??\G: jPjCcMlPoFi01804.exe File opened (read-only) \??\I: jPjCcMlPoFi01804.exe File opened (read-only) \??\J: jPjCcMlPoFi01804.exe File opened (read-only) \??\U: jPjCcMlPoFi01804.exe File opened (read-only) \??\X: jPjCcMlPoFi01804.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main jPjCcMlPoFi01804.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1672 2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe 1668 jPjCcMlPoFi01804.exe 1672 2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe 1668 jPjCcMlPoFi01804.exe 1672 2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe 1668 jPjCcMlPoFi01804.exe 1672 2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe 1668 jPjCcMlPoFi01804.exe 1672 2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe 1668 jPjCcMlPoFi01804.exe 1672 2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe 1668 jPjCcMlPoFi01804.exe 1672 2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe 1668 jPjCcMlPoFi01804.exe 1672 2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe 1668 jPjCcMlPoFi01804.exe 1672 2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe 1668 jPjCcMlPoFi01804.exe 1672 2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe 1668 jPjCcMlPoFi01804.exe 1672 2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe 1668 jPjCcMlPoFi01804.exe 1672 2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe 1668 jPjCcMlPoFi01804.exe 1672 2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe 1668 jPjCcMlPoFi01804.exe 1672 2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe 1668 jPjCcMlPoFi01804.exe 1672 2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe 1668 jPjCcMlPoFi01804.exe 1672 2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe 1668 jPjCcMlPoFi01804.exe 1672 2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe 1668 jPjCcMlPoFi01804.exe 1672 2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe 1668 jPjCcMlPoFi01804.exe 1672 2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe 1668 jPjCcMlPoFi01804.exe 1672 2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe 1668 jPjCcMlPoFi01804.exe 1672 2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe 1668 jPjCcMlPoFi01804.exe 1672 2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe 1668 jPjCcMlPoFi01804.exe 1672 2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe 1668 jPjCcMlPoFi01804.exe 1672 2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe 1668 jPjCcMlPoFi01804.exe 1672 2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe 1668 jPjCcMlPoFi01804.exe 1672 2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe 1668 jPjCcMlPoFi01804.exe 1672 2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe 1668 jPjCcMlPoFi01804.exe 1672 2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe 1668 jPjCcMlPoFi01804.exe 1672 2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe 1668 jPjCcMlPoFi01804.exe 1672 2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe 1668 jPjCcMlPoFi01804.exe 1672 2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe 1668 jPjCcMlPoFi01804.exe 1672 2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe 1668 jPjCcMlPoFi01804.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1672 2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe Token: SeDebugPrivilege 1668 jPjCcMlPoFi01804.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1668 jPjCcMlPoFi01804.exe 1668 jPjCcMlPoFi01804.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1668 jPjCcMlPoFi01804.exe 1668 jPjCcMlPoFi01804.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1668 jPjCcMlPoFi01804.exe 1668 jPjCcMlPoFi01804.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1672 wrote to memory of 1668 1672 2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe 27 PID 1672 wrote to memory of 1668 1672 2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe 27 PID 1672 wrote to memory of 1668 1672 2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe 27 PID 1672 wrote to memory of 1668 1672 2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe"C:\Users\Admin\AppData\Local\Temp\2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\ProgramData\jPjCcMlPoFi01804\jPjCcMlPoFi01804.exe"C:\ProgramData\jPjCcMlPoFi01804\jPjCcMlPoFi01804.exe" "C:\Users\Admin\AppData\Local\Temp\2f49652daadb8d7095d68b7b197b1ffddacef7d4b8e474ebe90d757fb7b02c95.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1668
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312KB
MD5e42cefdfd91c904b9d2d98f9a4b44447
SHA1b77296cb7d7b043e1cd10283f45a553f5d39ae4e
SHA2569b1383015a93d7492f549562306b5641bc0496a831007d0459bb40206298447c
SHA51266cf306076c146b0ebb1fdb258fbab1a536ff585d5fcef3f8fb0bbee3f073bbc8090b97f5204d40a6476ac008f97dcaa642df126bf8263e2963ba5cb2942d36d
-
Filesize
312KB
MD5e42cefdfd91c904b9d2d98f9a4b44447
SHA1b77296cb7d7b043e1cd10283f45a553f5d39ae4e
SHA2569b1383015a93d7492f549562306b5641bc0496a831007d0459bb40206298447c
SHA51266cf306076c146b0ebb1fdb258fbab1a536ff585d5fcef3f8fb0bbee3f073bbc8090b97f5204d40a6476ac008f97dcaa642df126bf8263e2963ba5cb2942d36d
-
Filesize
312KB
MD5e42cefdfd91c904b9d2d98f9a4b44447
SHA1b77296cb7d7b043e1cd10283f45a553f5d39ae4e
SHA2569b1383015a93d7492f549562306b5641bc0496a831007d0459bb40206298447c
SHA51266cf306076c146b0ebb1fdb258fbab1a536ff585d5fcef3f8fb0bbee3f073bbc8090b97f5204d40a6476ac008f97dcaa642df126bf8263e2963ba5cb2942d36d
-
Filesize
312KB
MD5e42cefdfd91c904b9d2d98f9a4b44447
SHA1b77296cb7d7b043e1cd10283f45a553f5d39ae4e
SHA2569b1383015a93d7492f549562306b5641bc0496a831007d0459bb40206298447c
SHA51266cf306076c146b0ebb1fdb258fbab1a536ff585d5fcef3f8fb0bbee3f073bbc8090b97f5204d40a6476ac008f97dcaa642df126bf8263e2963ba5cb2942d36d