Analysis
-
max time kernel
249s -
max time network
336s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 23:40
Static task
static1
Behavioral task
behavioral1
Sample
debcdd61755102943852b6dea4514c8e310370d33244e9d8506a56ecd4db4eee.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
debcdd61755102943852b6dea4514c8e310370d33244e9d8506a56ecd4db4eee.exe
Resource
win10v2004-20220812-en
General
-
Target
debcdd61755102943852b6dea4514c8e310370d33244e9d8506a56ecd4db4eee.exe
-
Size
216KB
-
MD5
7bf5254943ff2016e910b261d20b3601
-
SHA1
5fd7f70573736192c8a67afb75e902908b28eadd
-
SHA256
debcdd61755102943852b6dea4514c8e310370d33244e9d8506a56ecd4db4eee
-
SHA512
ec5ce285da2a57f31159d5fde9ebd0ac17a0386621c469fdc9c29290a9f0c30cfaa32000f4a72e065607f971a103a79515cdbc187ebb5ee28d4176ff00850f38
-
SSDEEP
1536:H/JfHuJJLdJaB0reFl0QuWe305XrudqyLSAumJ30h+3jE/gNlh1/7ND7zDT6WkXR:fa7ammjuwu1uEh1jNJkX0CLijNX
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" debcdd61755102943852b6dea4514c8e310370d33244e9d8506a56ecd4db4eee.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jiira.exe -
Executes dropped EXE 1 IoCs
pid Process 1272 jiira.exe -
Loads dropped DLL 2 IoCs
pid Process 588 debcdd61755102943852b6dea4514c8e310370d33244e9d8506a56ecd4db4eee.exe 588 debcdd61755102943852b6dea4514c8e310370d33244e9d8506a56ecd4db4eee.exe -
Adds Run key to start application 2 TTPs 26 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\jiira = "C:\\Users\\Admin\\jiira.exe /g" jiira.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\jiira = "C:\\Users\\Admin\\jiira.exe /d" jiira.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\jiira = "C:\\Users\\Admin\\jiira.exe /z" jiira.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\jiira = "C:\\Users\\Admin\\jiira.exe /k" jiira.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ debcdd61755102943852b6dea4514c8e310370d33244e9d8506a56ecd4db4eee.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\jiira = "C:\\Users\\Admin\\jiira.exe /q" jiira.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\jiira = "C:\\Users\\Admin\\jiira.exe /o" jiira.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\jiira = "C:\\Users\\Admin\\jiira.exe /u" jiira.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\jiira = "C:\\Users\\Admin\\jiira.exe /w" jiira.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\jiira = "C:\\Users\\Admin\\jiira.exe /r" jiira.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\jiira = "C:\\Users\\Admin\\jiira.exe /i" jiira.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ jiira.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\jiira = "C:\\Users\\Admin\\jiira.exe /v" jiira.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\jiira = "C:\\Users\\Admin\\jiira.exe /l" jiira.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\jiira = "C:\\Users\\Admin\\jiira.exe /p" jiira.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\jiira = "C:\\Users\\Admin\\jiira.exe /t" jiira.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\jiira = "C:\\Users\\Admin\\jiira.exe /f" jiira.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\jiira = "C:\\Users\\Admin\\jiira.exe /m" jiira.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\jiira = "C:\\Users\\Admin\\jiira.exe /u" debcdd61755102943852b6dea4514c8e310370d33244e9d8506a56ecd4db4eee.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\jiira = "C:\\Users\\Admin\\jiira.exe /e" jiira.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\jiira = "C:\\Users\\Admin\\jiira.exe /b" jiira.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\jiira = "C:\\Users\\Admin\\jiira.exe /c" jiira.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\jiira = "C:\\Users\\Admin\\jiira.exe /a" jiira.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\jiira = "C:\\Users\\Admin\\jiira.exe /j" jiira.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\jiira = "C:\\Users\\Admin\\jiira.exe /n" jiira.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\jiira = "C:\\Users\\Admin\\jiira.exe /h" jiira.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 588 debcdd61755102943852b6dea4514c8e310370d33244e9d8506a56ecd4db4eee.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe 1272 jiira.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 588 debcdd61755102943852b6dea4514c8e310370d33244e9d8506a56ecd4db4eee.exe 1272 jiira.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 588 wrote to memory of 1272 588 debcdd61755102943852b6dea4514c8e310370d33244e9d8506a56ecd4db4eee.exe 28 PID 588 wrote to memory of 1272 588 debcdd61755102943852b6dea4514c8e310370d33244e9d8506a56ecd4db4eee.exe 28 PID 588 wrote to memory of 1272 588 debcdd61755102943852b6dea4514c8e310370d33244e9d8506a56ecd4db4eee.exe 28 PID 588 wrote to memory of 1272 588 debcdd61755102943852b6dea4514c8e310370d33244e9d8506a56ecd4db4eee.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\debcdd61755102943852b6dea4514c8e310370d33244e9d8506a56ecd4db4eee.exe"C:\Users\Admin\AppData\Local\Temp\debcdd61755102943852b6dea4514c8e310370d33244e9d8506a56ecd4db4eee.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Users\Admin\jiira.exe"C:\Users\Admin\jiira.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1272
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD5accda81a718055e9d59e37eb61981e61
SHA16a0e8d157b285fd69155fec008a37ba364f79c7f
SHA2567512742562b4574c42f2425ff2003737afa2a0809edfb7b0881b916d97b31266
SHA5126421eeb28f33b3951cd28cff0e2f54c229e7e6a876ee9c2fda5465d417e0fad48279575d6d8093218b143821a6d12aaf03daa98c1261edb7642585984a101f9b
-
Filesize
216KB
MD5accda81a718055e9d59e37eb61981e61
SHA16a0e8d157b285fd69155fec008a37ba364f79c7f
SHA2567512742562b4574c42f2425ff2003737afa2a0809edfb7b0881b916d97b31266
SHA5126421eeb28f33b3951cd28cff0e2f54c229e7e6a876ee9c2fda5465d417e0fad48279575d6d8093218b143821a6d12aaf03daa98c1261edb7642585984a101f9b
-
Filesize
216KB
MD5accda81a718055e9d59e37eb61981e61
SHA16a0e8d157b285fd69155fec008a37ba364f79c7f
SHA2567512742562b4574c42f2425ff2003737afa2a0809edfb7b0881b916d97b31266
SHA5126421eeb28f33b3951cd28cff0e2f54c229e7e6a876ee9c2fda5465d417e0fad48279575d6d8093218b143821a6d12aaf03daa98c1261edb7642585984a101f9b
-
Filesize
216KB
MD5accda81a718055e9d59e37eb61981e61
SHA16a0e8d157b285fd69155fec008a37ba364f79c7f
SHA2567512742562b4574c42f2425ff2003737afa2a0809edfb7b0881b916d97b31266
SHA5126421eeb28f33b3951cd28cff0e2f54c229e7e6a876ee9c2fda5465d417e0fad48279575d6d8093218b143821a6d12aaf03daa98c1261edb7642585984a101f9b