Analysis
-
max time kernel
138s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2023 18:18
Static task
static1
Behavioral task
behavioral1
Sample
783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exe
Resource
win7-20221111-en
General
-
Target
783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exe
-
Size
118KB
-
MD5
34952df05ea29f84d07acca48a632a70
-
SHA1
38280fe8d98ee0997c279b25ac3fbf718b1509d8
-
SHA256
783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8
-
SHA512
91460927840fed03c5e4be0fc5a74009239e289505d6610cc962aef488b92903876dcc14034fd5221608a8e3260eed0bab5cd930c33dce2b1489f14d01a5a325
-
SSDEEP
1536:mHDQNHRoajvvFOQb/bevSVCyBT82KpIqxomwxpbI1DIAOEOMOwKY79MFCvJgZP1X:SFa4QbTDRBT82Kpzk4djGwKkxEPgWrH
Malware Config
Signatures
-
Drops file in System32 directory 4 IoCs
Processes:
showjpn.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 showjpn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE showjpn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies showjpn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 showjpn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 3 IoCs
Processes:
showjpn.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix showjpn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" showjpn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" showjpn.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
showjpn.exepid process 4900 showjpn.exe 4900 showjpn.exe 4900 showjpn.exe 4900 showjpn.exe 4900 showjpn.exe 4900 showjpn.exe 4900 showjpn.exe 4900 showjpn.exe 4900 showjpn.exe 4900 showjpn.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exepid process 2192 783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exeshowjpn.exedescription pid process target process PID 4872 wrote to memory of 2192 4872 783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exe 783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exe PID 4872 wrote to memory of 2192 4872 783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exe 783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exe PID 4872 wrote to memory of 2192 4872 783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exe 783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exe PID 4620 wrote to memory of 4900 4620 showjpn.exe showjpn.exe PID 4620 wrote to memory of 4900 4620 showjpn.exe showjpn.exe PID 4620 wrote to memory of 4900 4620 showjpn.exe showjpn.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exe"C:\Users\Admin\AppData\Local\Temp\783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exe--7495329f2⤵
- Suspicious behavior: RenamesItself
PID:2192
-
-
C:\Windows\SysWOW64\showjpn.exe"C:\Windows\SysWOW64\showjpn.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\SysWOW64\showjpn.exe--23c72ae12⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4900
-