Analysis
-
max time kernel
205s -
max time network
269s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 11:09
Static task
static1
Behavioral task
behavioral1
Sample
936492d66e50d3968be242ead680f1c875df9887e936863db32766d523e9090c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
936492d66e50d3968be242ead680f1c875df9887e936863db32766d523e9090c.exe
Resource
win10v2004-20220812-en
General
-
Target
936492d66e50d3968be242ead680f1c875df9887e936863db32766d523e9090c.exe
-
Size
270KB
-
MD5
b3a76e5fbec66b688634bf9fcfc772b8
-
SHA1
f20b911329c0b2598622125026b36ac26192f351
-
SHA256
936492d66e50d3968be242ead680f1c875df9887e936863db32766d523e9090c
-
SHA512
a05e16c0e1ebebeefcbf12ffe636851b52fa4edc3c87d71d4366435f86b440954709a0add0d50dede17e1e6329b88290ca5b3e06f16769ba309dae88183b9033
-
SSDEEP
6144:TtjpoIzqvoArlO+Bei92/pWTxq/fnx7GDrRcJIcxyCq0hzfb:Bcvo8LVq/PERcHxywb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ogjuij.exepid process 664 ogjuij.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 936 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
936492d66e50d3968be242ead680f1c875df9887e936863db32766d523e9090c.exepid process 916 936492d66e50d3968be242ead680f1c875df9887e936863db32766d523e9090c.exe 916 936492d66e50d3968be242ead680f1c875df9887e936863db32766d523e9090c.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ogjuij.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\Currentversion\Run ogjuij.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\{E8A35E48-3774-AD4D-52EE-D422474DF73F} = "C:\\Users\\Admin\\AppData\\Roaming\\Otof\\ogjuij.exe" ogjuij.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
936492d66e50d3968be242ead680f1c875df9887e936863db32766d523e9090c.exedescription pid process target process PID 916 set thread context of 936 916 936492d66e50d3968be242ead680f1c875df9887e936863db32766d523e9090c.exe cmd.exe -
Processes:
936492d66e50d3968be242ead680f1c875df9887e936863db32766d523e9090c.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Privacy 936492d66e50d3968be242ead680f1c875df9887e936863db32766d523e9090c.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 936492d66e50d3968be242ead680f1c875df9887e936863db32766d523e9090c.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
ogjuij.exepid process 664 ogjuij.exe 664 ogjuij.exe 664 ogjuij.exe 664 ogjuij.exe 664 ogjuij.exe 664 ogjuij.exe 664 ogjuij.exe 664 ogjuij.exe 664 ogjuij.exe 664 ogjuij.exe 664 ogjuij.exe 664 ogjuij.exe 664 ogjuij.exe 664 ogjuij.exe 664 ogjuij.exe 664 ogjuij.exe 664 ogjuij.exe 664 ogjuij.exe 664 ogjuij.exe 664 ogjuij.exe 664 ogjuij.exe 664 ogjuij.exe 664 ogjuij.exe 664 ogjuij.exe -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
936492d66e50d3968be242ead680f1c875df9887e936863db32766d523e9090c.exeogjuij.exepid process 916 936492d66e50d3968be242ead680f1c875df9887e936863db32766d523e9090c.exe 664 ogjuij.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
936492d66e50d3968be242ead680f1c875df9887e936863db32766d523e9090c.exeogjuij.exedescription pid process target process PID 916 wrote to memory of 664 916 936492d66e50d3968be242ead680f1c875df9887e936863db32766d523e9090c.exe ogjuij.exe PID 916 wrote to memory of 664 916 936492d66e50d3968be242ead680f1c875df9887e936863db32766d523e9090c.exe ogjuij.exe PID 916 wrote to memory of 664 916 936492d66e50d3968be242ead680f1c875df9887e936863db32766d523e9090c.exe ogjuij.exe PID 916 wrote to memory of 664 916 936492d66e50d3968be242ead680f1c875df9887e936863db32766d523e9090c.exe ogjuij.exe PID 664 wrote to memory of 1116 664 ogjuij.exe taskhost.exe PID 664 wrote to memory of 1116 664 ogjuij.exe taskhost.exe PID 664 wrote to memory of 1116 664 ogjuij.exe taskhost.exe PID 664 wrote to memory of 1116 664 ogjuij.exe taskhost.exe PID 664 wrote to memory of 1116 664 ogjuij.exe taskhost.exe PID 664 wrote to memory of 1188 664 ogjuij.exe Dwm.exe PID 664 wrote to memory of 1188 664 ogjuij.exe Dwm.exe PID 664 wrote to memory of 1188 664 ogjuij.exe Dwm.exe PID 664 wrote to memory of 1188 664 ogjuij.exe Dwm.exe PID 664 wrote to memory of 1188 664 ogjuij.exe Dwm.exe PID 664 wrote to memory of 1276 664 ogjuij.exe Explorer.EXE PID 664 wrote to memory of 1276 664 ogjuij.exe Explorer.EXE PID 664 wrote to memory of 1276 664 ogjuij.exe Explorer.EXE PID 664 wrote to memory of 1276 664 ogjuij.exe Explorer.EXE PID 664 wrote to memory of 1276 664 ogjuij.exe Explorer.EXE PID 664 wrote to memory of 916 664 ogjuij.exe 936492d66e50d3968be242ead680f1c875df9887e936863db32766d523e9090c.exe PID 664 wrote to memory of 916 664 ogjuij.exe 936492d66e50d3968be242ead680f1c875df9887e936863db32766d523e9090c.exe PID 664 wrote to memory of 916 664 ogjuij.exe 936492d66e50d3968be242ead680f1c875df9887e936863db32766d523e9090c.exe PID 664 wrote to memory of 916 664 ogjuij.exe 936492d66e50d3968be242ead680f1c875df9887e936863db32766d523e9090c.exe PID 664 wrote to memory of 916 664 ogjuij.exe 936492d66e50d3968be242ead680f1c875df9887e936863db32766d523e9090c.exe PID 916 wrote to memory of 936 916 936492d66e50d3968be242ead680f1c875df9887e936863db32766d523e9090c.exe cmd.exe PID 916 wrote to memory of 936 916 936492d66e50d3968be242ead680f1c875df9887e936863db32766d523e9090c.exe cmd.exe PID 916 wrote to memory of 936 916 936492d66e50d3968be242ead680f1c875df9887e936863db32766d523e9090c.exe cmd.exe PID 916 wrote to memory of 936 916 936492d66e50d3968be242ead680f1c875df9887e936863db32766d523e9090c.exe cmd.exe PID 916 wrote to memory of 936 916 936492d66e50d3968be242ead680f1c875df9887e936863db32766d523e9090c.exe cmd.exe PID 916 wrote to memory of 936 916 936492d66e50d3968be242ead680f1c875df9887e936863db32766d523e9090c.exe cmd.exe PID 916 wrote to memory of 936 916 936492d66e50d3968be242ead680f1c875df9887e936863db32766d523e9090c.exe cmd.exe PID 916 wrote to memory of 936 916 936492d66e50d3968be242ead680f1c875df9887e936863db32766d523e9090c.exe cmd.exe PID 916 wrote to memory of 936 916 936492d66e50d3968be242ead680f1c875df9887e936863db32766d523e9090c.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\936492d66e50d3968be242ead680f1c875df9887e936863db32766d523e9090c.exe"C:\Users\Admin\AppData\Local\Temp\936492d66e50d3968be242ead680f1c875df9887e936863db32766d523e9090c.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Users\Admin\AppData\Roaming\Otof\ogjuij.exe"C:\Users\Admin\AppData\Roaming\Otof\ogjuij.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp122bc17a.bat"3⤵
- Deletes itself
PID:936
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1188
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD59bace9a5a724e2d59a7174c32056bdda
SHA158c983d2461117a3f77de4e642f4c9df2a5e7fc3
SHA256ea4ba1bab4d9031707affe33db24ad716dd31a7a3437feeeb10189306b77fda9
SHA512de1c47d04f21799760ef29c893df289c62927eeb4d3708118a2f79009e826015712325184ac844ff5b1454c7c0e3d568c2cf036bfbddb9d02a2ab4fc81a4ff70
-
Filesize
270KB
MD57f6d30b90c88e8ae7f340d9045ccda89
SHA12e6c4d404c564618c1d89e25e2505db407bbb137
SHA256a80b92f4515b6814d87651b9f288c417bfec206d91ecc2af0286b8ecbd6ebc68
SHA5123e7588e6dd95083df8bd778deab7c88baa67382501f60f65c052df393f7d64c2348d654617e373c30d9c95684d19b8deeee658d3c967633bd2ad792822a34461
-
Filesize
270KB
MD57f6d30b90c88e8ae7f340d9045ccda89
SHA12e6c4d404c564618c1d89e25e2505db407bbb137
SHA256a80b92f4515b6814d87651b9f288c417bfec206d91ecc2af0286b8ecbd6ebc68
SHA5123e7588e6dd95083df8bd778deab7c88baa67382501f60f65c052df393f7d64c2348d654617e373c30d9c95684d19b8deeee658d3c967633bd2ad792822a34461
-
Filesize
270KB
MD57f6d30b90c88e8ae7f340d9045ccda89
SHA12e6c4d404c564618c1d89e25e2505db407bbb137
SHA256a80b92f4515b6814d87651b9f288c417bfec206d91ecc2af0286b8ecbd6ebc68
SHA5123e7588e6dd95083df8bd778deab7c88baa67382501f60f65c052df393f7d64c2348d654617e373c30d9c95684d19b8deeee658d3c967633bd2ad792822a34461
-
Filesize
270KB
MD57f6d30b90c88e8ae7f340d9045ccda89
SHA12e6c4d404c564618c1d89e25e2505db407bbb137
SHA256a80b92f4515b6814d87651b9f288c417bfec206d91ecc2af0286b8ecbd6ebc68
SHA5123e7588e6dd95083df8bd778deab7c88baa67382501f60f65c052df393f7d64c2348d654617e373c30d9c95684d19b8deeee658d3c967633bd2ad792822a34461