Analysis
-
max time kernel
138s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2023 18:18
Static task
static1
Behavioral task
behavioral1
Sample
783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exe
Resource
win7-20221111-en
8 signatures
150 seconds
General
-
Target
783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exe
-
Size
118KB
-
MD5
34952df05ea29f84d07acca48a632a70
-
SHA1
38280fe8d98ee0997c279b25ac3fbf718b1509d8
-
SHA256
783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8
-
SHA512
91460927840fed03c5e4be0fc5a74009239e289505d6610cc962aef488b92903876dcc14034fd5221608a8e3260eed0bab5cd930c33dce2b1489f14d01a5a325
-
SSDEEP
1536:mHDQNHRoajvvFOQb/bevSVCyBT82KpIqxomwxpbI1DIAOEOMOwKY79MFCvJgZP1X:SFa4QbTDRBT82Kpzk4djGwKkxEPgWrH
Malware Config
Signatures
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 showjpn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE showjpn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies showjpn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 showjpn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix showjpn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" showjpn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" showjpn.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4900 showjpn.exe 4900 showjpn.exe 4900 showjpn.exe 4900 showjpn.exe 4900 showjpn.exe 4900 showjpn.exe 4900 showjpn.exe 4900 showjpn.exe 4900 showjpn.exe 4900 showjpn.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2192 783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4872 wrote to memory of 2192 4872 783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exe 82 PID 4872 wrote to memory of 2192 4872 783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exe 82 PID 4872 wrote to memory of 2192 4872 783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exe 82 PID 4620 wrote to memory of 4900 4620 showjpn.exe 84 PID 4620 wrote to memory of 4900 4620 showjpn.exe 84 PID 4620 wrote to memory of 4900 4620 showjpn.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exe"C:\Users\Admin\AppData\Local\Temp\783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exe--7495329f2⤵
- Suspicious behavior: RenamesItself
PID:2192
-
-
C:\Windows\SysWOW64\showjpn.exe"C:\Windows\SysWOW64\showjpn.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\SysWOW64\showjpn.exe--23c72ae12⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4900
-