Analysis
-
max time kernel
172s -
max time network
68s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 21:02
Behavioral task
behavioral1
Sample
1e11120966d3d8c9a30424ea6a2622f48a6917ef0630a5432f0c24f2ebd2a7b5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1e11120966d3d8c9a30424ea6a2622f48a6917ef0630a5432f0c24f2ebd2a7b5.exe
Resource
win10v2004-20220812-en
General
-
Target
1e11120966d3d8c9a30424ea6a2622f48a6917ef0630a5432f0c24f2ebd2a7b5.exe
-
Size
146KB
-
MD5
347dd5d628f7c173865109ec1675a3b6
-
SHA1
6bb04ab532c61f4feead2c6ac57d1db136ce4fe3
-
SHA256
1e11120966d3d8c9a30424ea6a2622f48a6917ef0630a5432f0c24f2ebd2a7b5
-
SHA512
4f5ad90e991c89df480acb1dbd349ecb14380716469d172df8dbe8dcbc157cccde592a66df4a1f66c36b9097da0b73478294771ad245e0162288e3f7c1a33eae
-
SSDEEP
3072:HyBla+ZcXGqHzEhDYn5/NHPdm1AxALvWpq+9KbGsc/LOzh:8bUEwzlmaA+rY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
jdbgmgrnt.exepid process 1788 jdbgmgrnt.exe -
Processes:
resource yara_rule behavioral1/memory/1372-55-0x0000000000400000-0x0000000000513000-memory.dmp upx C:\Windows\jdbgmgrnt.exe upx behavioral1/memory/1788-62-0x0000000000400000-0x0000000000513000-memory.dmp upx behavioral1/memory/1372-63-0x0000000000400000-0x0000000000513000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
jdbgmgrnt.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run jdbgmgrnt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Registry NT Save = "\"c:\\windows\\jdbgmgrnt.exe\"" jdbgmgrnt.exe -
Drops file in Windows directory 3 IoCs
Processes:
1e11120966d3d8c9a30424ea6a2622f48a6917ef0630a5432f0c24f2ebd2a7b5.exejdbgmgrnt.exedescription ioc process File created \??\c:\windows\jdbgmgrnt.exe 1e11120966d3d8c9a30424ea6a2622f48a6917ef0630a5432f0c24f2ebd2a7b5.exe File opened for modification \??\c:\windows\jdbgmgrnt.exe 1e11120966d3d8c9a30424ea6a2622f48a6917ef0630a5432f0c24f2ebd2a7b5.exe File created C:\Windows\runlog.dat jdbgmgrnt.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
1e11120966d3d8c9a30424ea6a2622f48a6917ef0630a5432f0c24f2ebd2a7b5.exejdbgmgrnt.exepid process 1372 1e11120966d3d8c9a30424ea6a2622f48a6917ef0630a5432f0c24f2ebd2a7b5.exe 1788 jdbgmgrnt.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
1e11120966d3d8c9a30424ea6a2622f48a6917ef0630a5432f0c24f2ebd2a7b5.exedescription pid process target process PID 1372 wrote to memory of 1788 1372 1e11120966d3d8c9a30424ea6a2622f48a6917ef0630a5432f0c24f2ebd2a7b5.exe jdbgmgrnt.exe PID 1372 wrote to memory of 1788 1372 1e11120966d3d8c9a30424ea6a2622f48a6917ef0630a5432f0c24f2ebd2a7b5.exe jdbgmgrnt.exe PID 1372 wrote to memory of 1788 1372 1e11120966d3d8c9a30424ea6a2622f48a6917ef0630a5432f0c24f2ebd2a7b5.exe jdbgmgrnt.exe PID 1372 wrote to memory of 1788 1372 1e11120966d3d8c9a30424ea6a2622f48a6917ef0630a5432f0c24f2ebd2a7b5.exe jdbgmgrnt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e11120966d3d8c9a30424ea6a2622f48a6917ef0630a5432f0c24f2ebd2a7b5.exe"C:\Users\Admin\AppData\Local\Temp\1e11120966d3d8c9a30424ea6a2622f48a6917ef0630a5432f0c24f2ebd2a7b5.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1372 -
\??\c:\windows\jdbgmgrnt.exec:\windows\jdbgmgrnt.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1788
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
146KB
MD5347dd5d628f7c173865109ec1675a3b6
SHA16bb04ab532c61f4feead2c6ac57d1db136ce4fe3
SHA2561e11120966d3d8c9a30424ea6a2622f48a6917ef0630a5432f0c24f2ebd2a7b5
SHA5124f5ad90e991c89df480acb1dbd349ecb14380716469d172df8dbe8dcbc157cccde592a66df4a1f66c36b9097da0b73478294771ad245e0162288e3f7c1a33eae