Analysis
-
max time kernel
127s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 03:15
Static task
static1
Behavioral task
behavioral1
Sample
742b5e4db1e251cb36c811d551d18e88de805e012f75b1fed70801b0b152ffc5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
742b5e4db1e251cb36c811d551d18e88de805e012f75b1fed70801b0b152ffc5.exe
Resource
win10v2004-20220812-en
General
-
Target
742b5e4db1e251cb36c811d551d18e88de805e012f75b1fed70801b0b152ffc5.exe
-
Size
215KB
-
MD5
f2839e301135eecd3c07ca85f4851d50
-
SHA1
4cee4eac5f65336ca1d3094a65a1788983b99633
-
SHA256
742b5e4db1e251cb36c811d551d18e88de805e012f75b1fed70801b0b152ffc5
-
SHA512
323fe7552312de7a84baf98ac9e3ab749cc9961779c2d2aae9e92851581091f4a02048821cd1af83ad05f852f2f868431c68f99a5c447c7728b564bc67611273
-
SSDEEP
6144:CDJVazMKV31FdaQvXluxqU+A/0y+nt75voqQEnHJ:CDJM/bXntAh+nhZoqQEHJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1056 jydekdj.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\jydekdj.exe 742b5e4db1e251cb36c811d551d18e88de805e012f75b1fed70801b0b152ffc5.exe File created C:\PROGRA~3\Mozilla\xdldjol.dll jydekdj.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 560 wrote to memory of 1056 560 taskeng.exe 29 PID 560 wrote to memory of 1056 560 taskeng.exe 29 PID 560 wrote to memory of 1056 560 taskeng.exe 29 PID 560 wrote to memory of 1056 560 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\742b5e4db1e251cb36c811d551d18e88de805e012f75b1fed70801b0b152ffc5.exe"C:\Users\Admin\AppData\Local\Temp\742b5e4db1e251cb36c811d551d18e88de805e012f75b1fed70801b0b152ffc5.exe"1⤵
- Drops file in Program Files directory
PID:976
-
C:\Windows\system32\taskeng.exetaskeng.exe {397BCD4F-3EA2-4021-977A-CD3943BEE41E} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:560 -
C:\PROGRA~3\Mozilla\jydekdj.exeC:\PROGRA~3\Mozilla\jydekdj.exe -vamlaul2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1056
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
215KB
MD56a90a5feb0258284a5119d4a20a089e6
SHA151ed4f9d6af1806e4b02782c8095c01a17b161b3
SHA2565f6974df73c7dc8051a88214a986bedcd0af6db64299a8c888c8f415230d40f9
SHA5129548bb7bc4261e04f6f3a79221edb5b745364292b40025873a76940761d1bbb60847390dad5500b757368325367d3d489cd319b8f34531d6447b0d8909b812aa
-
Filesize
215KB
MD56a90a5feb0258284a5119d4a20a089e6
SHA151ed4f9d6af1806e4b02782c8095c01a17b161b3
SHA2565f6974df73c7dc8051a88214a986bedcd0af6db64299a8c888c8f415230d40f9
SHA5129548bb7bc4261e04f6f3a79221edb5b745364292b40025873a76940761d1bbb60847390dad5500b757368325367d3d489cd319b8f34531d6447b0d8909b812aa