Analysis
-
max time kernel
104s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 06:47
Behavioral task
behavioral1
Sample
DekaronJSQ5.7ʽ/DekaronJSQ.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
DekaronJSQ5.7ʽ/DekaronJSQ.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
DekaronJSQ5.7ʽ/DekaronJSQ³.exe
Resource
win7-20220812-en
General
-
Target
DekaronJSQ5.7ʽ/DekaronJSQ³.exe
-
Size
1008KB
-
MD5
1b66f7ac9b3a6c8ae7725ddca3f430c5
-
SHA1
686d1bbfa8290836452308b315e1378ee8acb655
-
SHA256
5ade0c68918a2a8e390cf9d8dce3c57a8917abd377b84a0272e68bc78e7b7872
-
SHA512
c781b78edf8f10a6491497ca3ca7288f9a985ba1ddda745a1baa8a448604a313524556fbcac2fc343453394e57dabbd9333c365407915803eb018702a019c618
-
SSDEEP
24576:brToBbKlrXksHQqyyZuKFd4kJEhvPctSIkI4Ekcs/2f0rbUsYPc3F5wC8m444qr5:brTpkMciN4kJEhvPmkI4Ekcs/2f0rbU8
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral3/memory/1832-56-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1832-57-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1832-58-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1832-60-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1832-62-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1832-64-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1832-66-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1832-68-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1832-70-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1832-72-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1832-74-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1832-76-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1832-78-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1832-82-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1832-84-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1832-86-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1832-90-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1832-94-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1832-98-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1832-96-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1832-92-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1832-88-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1832-80-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1832-99-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Processes:
resource yara_rule behavioral3/memory/1832-54-0x0000000000400000-0x00000000006A2000-memory.dmp vmprotect behavioral3/memory/1832-100-0x0000000000400000-0x00000000006A2000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
DekaronJSQ³.exepid process 1832 DekaronJSQ³.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
DekaronJSQ³.exepid process 1832 DekaronJSQ³.exe 1832 DekaronJSQ³.exe 1832 DekaronJSQ³.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1832-54-0x0000000000400000-0x00000000006A2000-memory.dmpFilesize
2.6MB
-
memory/1832-55-0x00000000751A1000-0x00000000751A3000-memory.dmpFilesize
8KB
-
memory/1832-56-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1832-57-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1832-58-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1832-60-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1832-62-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1832-64-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1832-66-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1832-68-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1832-70-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1832-72-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1832-74-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1832-76-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1832-78-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1832-82-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1832-84-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1832-86-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1832-90-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1832-94-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1832-98-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1832-96-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1832-92-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1832-88-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1832-80-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1832-99-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1832-100-0x0000000000400000-0x00000000006A2000-memory.dmpFilesize
2.6MB