Analysis
-
max time kernel
42s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:42
Static task
static1
Behavioral task
behavioral1
Sample
jetsoff6543.exe
Resource
win7-20221111-en
General
-
Target
jetsoff6543.exe
-
Size
214KB
-
MD5
3052597dc463bafa0c102a204dbf58fc
-
SHA1
bc083a8e34abfc24ea8b94b1325354ea2f4a08bb
-
SHA256
84a150ec171d193dbd5738ade685f3225716b6945e59625ce458f0a9069860b8
-
SHA512
9925797cf5061017bcfbf37ab968c0ddeda7e7abd6d2db8abb62aeb6ca0a711672b1cfd9c8a3ef7af07cedc9b7a4d8d0071a2371caabaacd9323d270ab6d4246
-
SSDEEP
6144:qweEpoJiPJhQxjr858KG3NLsJrdtvUlAg:boJi0xnYUaJpx5g
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
qfaeenx.exeqfaeenx.exepid process 2016 qfaeenx.exe 1012 qfaeenx.exe -
Loads dropped DLL 5 IoCs
Processes:
jetsoff6543.exeqfaeenx.exeWerFault.exepid process 2000 jetsoff6543.exe 2016 qfaeenx.exe 676 WerFault.exe 676 WerFault.exe 676 WerFault.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
qfaeenx.exedescription pid process target process PID 2016 set thread context of 1012 2016 qfaeenx.exe qfaeenx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 676 1012 WerFault.exe qfaeenx.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
qfaeenx.exepid process 2016 qfaeenx.exe 2016 qfaeenx.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
jetsoff6543.exeqfaeenx.exeqfaeenx.exedescription pid process target process PID 2000 wrote to memory of 2016 2000 jetsoff6543.exe qfaeenx.exe PID 2000 wrote to memory of 2016 2000 jetsoff6543.exe qfaeenx.exe PID 2000 wrote to memory of 2016 2000 jetsoff6543.exe qfaeenx.exe PID 2000 wrote to memory of 2016 2000 jetsoff6543.exe qfaeenx.exe PID 2016 wrote to memory of 1012 2016 qfaeenx.exe qfaeenx.exe PID 2016 wrote to memory of 1012 2016 qfaeenx.exe qfaeenx.exe PID 2016 wrote to memory of 1012 2016 qfaeenx.exe qfaeenx.exe PID 2016 wrote to memory of 1012 2016 qfaeenx.exe qfaeenx.exe PID 2016 wrote to memory of 1012 2016 qfaeenx.exe qfaeenx.exe PID 1012 wrote to memory of 676 1012 qfaeenx.exe WerFault.exe PID 1012 wrote to memory of 676 1012 qfaeenx.exe WerFault.exe PID 1012 wrote to memory of 676 1012 qfaeenx.exe WerFault.exe PID 1012 wrote to memory of 676 1012 qfaeenx.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\jetsoff6543.exe"C:\Users\Admin\AppData\Local\Temp\jetsoff6543.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\qfaeenx.exe"C:\Users\Admin\AppData\Local\Temp\qfaeenx.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\qfaeenx.exe"C:\Users\Admin\AppData\Local\Temp\qfaeenx.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1012 -s 364⤵
- Loads dropped DLL
- Program crash
PID:676
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD51c76048e3b5258e026fd31e7d3cc1530
SHA125bef57a5eda44f8bd59e6aecd7cf8f681bc66b8
SHA256a067079fe15e9c86bea9eaa38a258d77129195eb585e17e90ff01bf981b9d3ac
SHA512fb1f76d24fd2800348b7b179beb06728a30e7142c13feb55174a99414a435d4200483b255773befcad22e1fbbb180b0cf52e0f7e9160df8cb0084614cd7df2cf
-
Filesize
8KB
MD51c76048e3b5258e026fd31e7d3cc1530
SHA125bef57a5eda44f8bd59e6aecd7cf8f681bc66b8
SHA256a067079fe15e9c86bea9eaa38a258d77129195eb585e17e90ff01bf981b9d3ac
SHA512fb1f76d24fd2800348b7b179beb06728a30e7142c13feb55174a99414a435d4200483b255773befcad22e1fbbb180b0cf52e0f7e9160df8cb0084614cd7df2cf
-
Filesize
8KB
MD51c76048e3b5258e026fd31e7d3cc1530
SHA125bef57a5eda44f8bd59e6aecd7cf8f681bc66b8
SHA256a067079fe15e9c86bea9eaa38a258d77129195eb585e17e90ff01bf981b9d3ac
SHA512fb1f76d24fd2800348b7b179beb06728a30e7142c13feb55174a99414a435d4200483b255773befcad22e1fbbb180b0cf52e0f7e9160df8cb0084614cd7df2cf
-
Filesize
185KB
MD59474ef9cd3b0e642db9b2eb53949a6ad
SHA1cf0d057435c123e0cebe651907365a6d56c3f328
SHA256fe8c90ecfacda561029d39d7356811db9df051e0edecc01e845a5da6396d836c
SHA512e9aed14f30fbfb904289f89f16243906381718a5fcddb67b4d9ba3b3713cb49495dafa6834290787d96b3b83e8c56a649132042916300b5bbb58429479dbffcc
-
Filesize
5KB
MD5fa296506bdb3a5f9aefa7144420a40a1
SHA1010f9af53e8030a4586fa038c847432e5639dcbd
SHA256bc8ab2be1593c8888b52515ad970855a40ed469138f34b5b4e17998f9682ba43
SHA512441941fd51f1be98c37cb169f86d8c82f2ab17cdfacb7bcd728becf80974796e37720cffc71c9052cc36618d11401aa928c39e9e9e266d17e148044a6d5bb331
-
Filesize
8KB
MD51c76048e3b5258e026fd31e7d3cc1530
SHA125bef57a5eda44f8bd59e6aecd7cf8f681bc66b8
SHA256a067079fe15e9c86bea9eaa38a258d77129195eb585e17e90ff01bf981b9d3ac
SHA512fb1f76d24fd2800348b7b179beb06728a30e7142c13feb55174a99414a435d4200483b255773befcad22e1fbbb180b0cf52e0f7e9160df8cb0084614cd7df2cf
-
Filesize
8KB
MD51c76048e3b5258e026fd31e7d3cc1530
SHA125bef57a5eda44f8bd59e6aecd7cf8f681bc66b8
SHA256a067079fe15e9c86bea9eaa38a258d77129195eb585e17e90ff01bf981b9d3ac
SHA512fb1f76d24fd2800348b7b179beb06728a30e7142c13feb55174a99414a435d4200483b255773befcad22e1fbbb180b0cf52e0f7e9160df8cb0084614cd7df2cf
-
Filesize
8KB
MD51c76048e3b5258e026fd31e7d3cc1530
SHA125bef57a5eda44f8bd59e6aecd7cf8f681bc66b8
SHA256a067079fe15e9c86bea9eaa38a258d77129195eb585e17e90ff01bf981b9d3ac
SHA512fb1f76d24fd2800348b7b179beb06728a30e7142c13feb55174a99414a435d4200483b255773befcad22e1fbbb180b0cf52e0f7e9160df8cb0084614cd7df2cf
-
Filesize
8KB
MD51c76048e3b5258e026fd31e7d3cc1530
SHA125bef57a5eda44f8bd59e6aecd7cf8f681bc66b8
SHA256a067079fe15e9c86bea9eaa38a258d77129195eb585e17e90ff01bf981b9d3ac
SHA512fb1f76d24fd2800348b7b179beb06728a30e7142c13feb55174a99414a435d4200483b255773befcad22e1fbbb180b0cf52e0f7e9160df8cb0084614cd7df2cf
-
Filesize
8KB
MD51c76048e3b5258e026fd31e7d3cc1530
SHA125bef57a5eda44f8bd59e6aecd7cf8f681bc66b8
SHA256a067079fe15e9c86bea9eaa38a258d77129195eb585e17e90ff01bf981b9d3ac
SHA512fb1f76d24fd2800348b7b179beb06728a30e7142c13feb55174a99414a435d4200483b255773befcad22e1fbbb180b0cf52e0f7e9160df8cb0084614cd7df2cf