Analysis
-
max time kernel
90s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 08:59
Static task
static1
Behavioral task
behavioral1
Sample
c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe
Resource
win10v2004-20220901-en
General
-
Target
c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe
-
Size
45KB
-
MD5
3e70d9a82e68af43f27dbde3a7492490
-
SHA1
4e46ebea70e6fbecdba8d274daeb43f9b9bdf9f3
-
SHA256
c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198
-
SHA512
5e0aed6c743535aba1470149da064f9a9cd18d57202479cc552181687969fd2949a438f74358a0ac63c053ef7fdb6c38040660cfbd078f73ac6ac07e89e9c1b6
-
SSDEEP
768:XZwb9TV5ZDzu83AqN1LZNneGcRnks/iaeS9rmJIga9/U/1H5:XZwb9TvZ3wqnL67RnkMVmeq
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
Processes:
c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe -
Executes dropped EXE 1 IoCs
Processes:
Jmffdkpn.exepid process 848 Jmffdkpn.exe -
Drops file in System32 directory 3 IoCs
Processes:
c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exedescription ioc process File created C:\Windows\SysWOW64\Jmffdkpn.exe c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe File opened for modification C:\Windows\SysWOW64\Jmffdkpn.exe c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe File created C:\Windows\SysWOW64\Cdghjo32.dll c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
Jmffdkpn.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BrowseNewProcess Jmffdkpn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BrowseNewProcess\BrowseNewProcess = "yes" Jmffdkpn.exe -
Modifies registry class 6 IoCs
Processes:
c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cdghjo32.dll" c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Jmffdkpn.exepid process 848 Jmffdkpn.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exedescription pid process target process PID 4572 wrote to memory of 848 4572 c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe Jmffdkpn.exe PID 4572 wrote to memory of 848 4572 c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe Jmffdkpn.exe PID 4572 wrote to memory of 848 4572 c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe Jmffdkpn.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe"C:\Users\Admin\AppData\Local\Temp\c8a7af2d91f1b22cc8bc59070e246f6d7bd1a91a45d9729db3a373fb6ce4b198.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jmffdkpn.exeC:\Windows\system32\Jmffdkpn.exe2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious behavior: GetForegroundWindowSpam
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\Jmffdkpn.exeFilesize
45KB
MD5c1b5f7661ad35321d8f8be513b1b3dcc
SHA135d9d5851de567c91230006357cd50accfa4c04c
SHA2568579e0612baac09786321770f5c8b850f7207380a27cfc5847e63be5f82826bd
SHA51275ba32cbb61deb9e07c7404d7be6cc0c48bc14799a22377307b0c52caee7837580507b96c30df8a43ab5a38f156348bb08bb4cabcaca95f3e2b67cdd92a912b4
-
C:\Windows\SysWOW64\Jmffdkpn.exeFilesize
45KB
MD5c1b5f7661ad35321d8f8be513b1b3dcc
SHA135d9d5851de567c91230006357cd50accfa4c04c
SHA2568579e0612baac09786321770f5c8b850f7207380a27cfc5847e63be5f82826bd
SHA51275ba32cbb61deb9e07c7404d7be6cc0c48bc14799a22377307b0c52caee7837580507b96c30df8a43ab5a38f156348bb08bb4cabcaca95f3e2b67cdd92a912b4
-
memory/848-133-0x0000000000000000-mapping.dmp
-
memory/848-137-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/848-138-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/4572-132-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/4572-136-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB