Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 10:47
Static task
static1
Behavioral task
behavioral1
Sample
0ac7f4575c7cc9ed4a5258ac095ee04ee24aa595adc3356dd10207a7c7487a57.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0ac7f4575c7cc9ed4a5258ac095ee04ee24aa595adc3356dd10207a7c7487a57.exe
Resource
win10v2004-20221111-en
General
-
Target
0ac7f4575c7cc9ed4a5258ac095ee04ee24aa595adc3356dd10207a7c7487a57.exe
-
Size
148KB
-
MD5
a7e4a15c238c5f1731329da0ce9535ca
-
SHA1
b1694a2db44eb9c147607581f2d233ef6f97c304
-
SHA256
0ac7f4575c7cc9ed4a5258ac095ee04ee24aa595adc3356dd10207a7c7487a57
-
SHA512
0fbee04ac22a928e62ddef17e46b268c9ea2d732e55cc491c1e2a9397cd55618850fbf7fc8317493de17044a96727108b9df26cc1b4851687c5e89b852a202fc
-
SSDEEP
3072:5NYD0o7ELVWeIrnt/Jb03S8Me2lqO7Z/n18wzA0HFIy:sYueIrndei82nh18wsi
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Cjynya.exepid process 1000 Cjynya.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Cjynya.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run Cjynya.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\5GUTNY6MFK = "C:\\Windows\\Cjynya.exe" Cjynya.exe -
Drops file in Windows directory 4 IoCs
Processes:
0ac7f4575c7cc9ed4a5258ac095ee04ee24aa595adc3356dd10207a7c7487a57.exedescription ioc process File opened for modification C:\Windows\Cjynya.exe 0ac7f4575c7cc9ed4a5258ac095ee04ee24aa595adc3356dd10207a7c7487a57.exe File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 0ac7f4575c7cc9ed4a5258ac095ee04ee24aa595adc3356dd10207a7c7487a57.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 0ac7f4575c7cc9ed4a5258ac095ee04ee24aa595adc3356dd10207a7c7487a57.exe File created C:\Windows\Cjynya.exe 0ac7f4575c7cc9ed4a5258ac095ee04ee24aa595adc3356dd10207a7c7487a57.exe -
Processes:
Cjynya.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main Cjynya.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\International Cjynya.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Cjynya.exepid process 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe 1000 Cjynya.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
0ac7f4575c7cc9ed4a5258ac095ee04ee24aa595adc3356dd10207a7c7487a57.exedescription pid process target process PID 1552 wrote to memory of 1000 1552 0ac7f4575c7cc9ed4a5258ac095ee04ee24aa595adc3356dd10207a7c7487a57.exe Cjynya.exe PID 1552 wrote to memory of 1000 1552 0ac7f4575c7cc9ed4a5258ac095ee04ee24aa595adc3356dd10207a7c7487a57.exe Cjynya.exe PID 1552 wrote to memory of 1000 1552 0ac7f4575c7cc9ed4a5258ac095ee04ee24aa595adc3356dd10207a7c7487a57.exe Cjynya.exe PID 1552 wrote to memory of 1000 1552 0ac7f4575c7cc9ed4a5258ac095ee04ee24aa595adc3356dd10207a7c7487a57.exe Cjynya.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ac7f4575c7cc9ed4a5258ac095ee04ee24aa595adc3356dd10207a7c7487a57.exe"C:\Users\Admin\AppData\Local\Temp\0ac7f4575c7cc9ed4a5258ac095ee04ee24aa595adc3356dd10207a7c7487a57.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\Cjynya.exeC:\Windows\Cjynya.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:1000
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD5a7e4a15c238c5f1731329da0ce9535ca
SHA1b1694a2db44eb9c147607581f2d233ef6f97c304
SHA2560ac7f4575c7cc9ed4a5258ac095ee04ee24aa595adc3356dd10207a7c7487a57
SHA5120fbee04ac22a928e62ddef17e46b268c9ea2d732e55cc491c1e2a9397cd55618850fbf7fc8317493de17044a96727108b9df26cc1b4851687c5e89b852a202fc
-
Filesize
408B
MD50732bbfb8a0c71568d4510af80b946de
SHA13ece18e441c729acc3bd5b050dec2636abc80f74
SHA2565507409fb8adadb288e83be4827ff0ef2b37bb1ef3d58b5e74236d4bae7290be
SHA51208b3afab54badb8e548e52f835f0d68b1149436526f21316d69e3d399534712747325e9ad47a40b66891f58af571347607a746039d91eb6d8f56a87c690fbdc9