Analysis
-
max time kernel
141s -
max time network
36s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
08-06-2023 19:39
Behavioral task
behavioral1
Sample
8ff9f4513a27aac296994173104350fbdbc97d41cafd3afd37a2b09f69e5856c.exe
Resource
win7-20230220-en
General
-
Target
8ff9f4513a27aac296994173104350fbdbc97d41cafd3afd37a2b09f69e5856c.exe
-
Size
513KB
-
MD5
6629289fd2abf1c30a16fb9578ff4e08
-
SHA1
1bd30832f866299027722104c6a92f8ccca594f9
-
SHA256
8ff9f4513a27aac296994173104350fbdbc97d41cafd3afd37a2b09f69e5856c
-
SHA512
41920d19d6791b88f06fd8e57e38365c3bcc318fd5f4e4411a76318ad3fbca4cbcb8854ccd9526f2c4c00899c03eddb955ebd886b084bb11b1f13b7533842c3d
-
SSDEEP
12288:M7y5t7wPDi5ttUT18OB2AM3zX1Ke9y0p/wgwP3QJ1:M7Kt7wPDGkJf2Amge9f9wT4J1
Malware Config
Signatures
-
Downloads MZ/PE file
-
Processes:
resource yara_rule \Users\Public\xiaodaxzqxia\jecxz.exe aspack_v212_v242 C:\Users\Public\xiaodaxzqxia\jecxz.exe aspack_v212_v242 C:\Users\Public\xiaodaxzqxia\jecxz.exe aspack_v212_v242 \Users\Public\xiaodaxzqxia\jecxz.exe aspack_v212_v242 -
Executes dropped EXE 2 IoCs
Processes:
jecxz.exev.exepid process 1428 jecxz.exe 864 v.exe -
Loads dropped DLL 4 IoCs
Processes:
8ff9f4513a27aac296994173104350fbdbc97d41cafd3afd37a2b09f69e5856c.exepid process 1604 8ff9f4513a27aac296994173104350fbdbc97d41cafd3afd37a2b09f69e5856c.exe 1604 8ff9f4513a27aac296994173104350fbdbc97d41cafd3afd37a2b09f69e5856c.exe 1604 8ff9f4513a27aac296994173104350fbdbc97d41cafd3afd37a2b09f69e5856c.exe 1604 8ff9f4513a27aac296994173104350fbdbc97d41cafd3afd37a2b09f69e5856c.exe -
Processes:
resource yara_rule behavioral1/memory/1604-54-0x0000000000400000-0x000000000058A200-memory.dmp upx behavioral1/memory/1604-58-0x0000000000400000-0x000000000058A200-memory.dmp upx behavioral1/memory/1604-88-0x0000000000400000-0x000000000058A200-memory.dmp upx behavioral1/memory/1604-89-0x0000000000400000-0x000000000058A200-memory.dmp upx behavioral1/memory/1604-92-0x0000000000400000-0x000000000058A200-memory.dmp upx behavioral1/memory/1604-95-0x0000000000400000-0x000000000058A200-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
8ff9f4513a27aac296994173104350fbdbc97d41cafd3afd37a2b09f69e5856c.exepid process 1604 8ff9f4513a27aac296994173104350fbdbc97d41cafd3afd37a2b09f69e5856c.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
8ff9f4513a27aac296994173104350fbdbc97d41cafd3afd37a2b09f69e5856c.exepid process 1604 8ff9f4513a27aac296994173104350fbdbc97d41cafd3afd37a2b09f69e5856c.exe 1604 8ff9f4513a27aac296994173104350fbdbc97d41cafd3afd37a2b09f69e5856c.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
8ff9f4513a27aac296994173104350fbdbc97d41cafd3afd37a2b09f69e5856c.exejecxz.exedescription pid process target process PID 1604 wrote to memory of 1428 1604 8ff9f4513a27aac296994173104350fbdbc97d41cafd3afd37a2b09f69e5856c.exe jecxz.exe PID 1604 wrote to memory of 1428 1604 8ff9f4513a27aac296994173104350fbdbc97d41cafd3afd37a2b09f69e5856c.exe jecxz.exe PID 1604 wrote to memory of 1428 1604 8ff9f4513a27aac296994173104350fbdbc97d41cafd3afd37a2b09f69e5856c.exe jecxz.exe PID 1604 wrote to memory of 1428 1604 8ff9f4513a27aac296994173104350fbdbc97d41cafd3afd37a2b09f69e5856c.exe jecxz.exe PID 1428 wrote to memory of 744 1428 jecxz.exe cmd.exe PID 1428 wrote to memory of 744 1428 jecxz.exe cmd.exe PID 1428 wrote to memory of 744 1428 jecxz.exe cmd.exe PID 1428 wrote to memory of 744 1428 jecxz.exe cmd.exe PID 1604 wrote to memory of 864 1604 8ff9f4513a27aac296994173104350fbdbc97d41cafd3afd37a2b09f69e5856c.exe v.exe PID 1604 wrote to memory of 864 1604 8ff9f4513a27aac296994173104350fbdbc97d41cafd3afd37a2b09f69e5856c.exe v.exe PID 1604 wrote to memory of 864 1604 8ff9f4513a27aac296994173104350fbdbc97d41cafd3afd37a2b09f69e5856c.exe v.exe PID 1604 wrote to memory of 864 1604 8ff9f4513a27aac296994173104350fbdbc97d41cafd3afd37a2b09f69e5856c.exe v.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ff9f4513a27aac296994173104350fbdbc97d41cafd3afd37a2b09f69e5856c.exe"C:\Users\Admin\AppData\Local\Temp\8ff9f4513a27aac296994173104350fbdbc97d41cafd3afd37a2b09f69e5856c.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Public\xiaodaxzqxia\jecxz.exeC:\Users\Public\xiaodaxzqxia\jecxz.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c pause3⤵
-
C:\Users\Public\xiaodaxzqxia\v.exe"C:\Users\Public\xiaodaxzqxia\v.exe" -o C:\Users\Public\xiaodaxzqxia\111 -d C:\Users\Public\xiaodaxzqxia2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Public\xiaodaxzqxia\111Filesize
1.1MB
MD56d3fdfa871671c5e41f8d05f0140abf1
SHA16e55d6e3a329809dcf69e0a70cdc4ea3700b8c6c
SHA256a017033cc4fd3743fd778269e703c4818c6e5eac79d1477a00f20c2ffd51e4de
SHA512c804d53c327aed4e7559d0e1e5166938e3e9960301fab0ad61489e063affb458df382521ac2ae60b7a5a9e7ee8fb761ad7190595f1b284efa20a14946bb53db0
-
C:\Users\Public\xiaodaxzqxia\jecxz.exeFilesize
114KB
MD594eb950bbf80edd41f9073ce55a4b08d
SHA11f222a5ccd2b474fbed19d34af5d3607ade5024d
SHA256429952e76c2b06dd9c0a4843f18721dd9daa4c8652657f084b5607aef28e1cd2
SHA5123baefbd7833c4b6f009bc8b6e7a152463e9dfb981271ecbffe00251c841a60f379895c77139a36f92e72dc09b578b9b4a3e0c7eac34ba6afcddd1e0ff0b591b0
-
C:\Users\Public\xiaodaxzqxia\jecxz.exeFilesize
114KB
MD594eb950bbf80edd41f9073ce55a4b08d
SHA11f222a5ccd2b474fbed19d34af5d3607ade5024d
SHA256429952e76c2b06dd9c0a4843f18721dd9daa4c8652657f084b5607aef28e1cd2
SHA5123baefbd7833c4b6f009bc8b6e7a152463e9dfb981271ecbffe00251c841a60f379895c77139a36f92e72dc09b578b9b4a3e0c7eac34ba6afcddd1e0ff0b591b0
-
C:\Users\Public\xiaodaxzqxia\v.exeFilesize
142KB
MD5bbaea75e78b80434b7cd699749b93a97
SHA1c7d151758cb88dee39dbb5f4cd30e7d226980dde
SHA256c9a1c52f5f5c8deef76b8e989c6a377f00061fa369cbd1cee7f53f8f03295f5c
SHA5127f41846d61452c73566554ba5f6ef356e757ff4c292ad68bbcc1b84f736c02c6b0bc52e13270e5d7be4cde743d40cfc281028d4a0e322fbeecd9b786d08bac3d
-
C:\Users\Public\xiaodaxzqxia\v.exeFilesize
142KB
MD5bbaea75e78b80434b7cd699749b93a97
SHA1c7d151758cb88dee39dbb5f4cd30e7d226980dde
SHA256c9a1c52f5f5c8deef76b8e989c6a377f00061fa369cbd1cee7f53f8f03295f5c
SHA5127f41846d61452c73566554ba5f6ef356e757ff4c292ad68bbcc1b84f736c02c6b0bc52e13270e5d7be4cde743d40cfc281028d4a0e322fbeecd9b786d08bac3d
-
\Users\Public\xiaodaxzqxia\jecxz.exeFilesize
114KB
MD594eb950bbf80edd41f9073ce55a4b08d
SHA11f222a5ccd2b474fbed19d34af5d3607ade5024d
SHA256429952e76c2b06dd9c0a4843f18721dd9daa4c8652657f084b5607aef28e1cd2
SHA5123baefbd7833c4b6f009bc8b6e7a152463e9dfb981271ecbffe00251c841a60f379895c77139a36f92e72dc09b578b9b4a3e0c7eac34ba6afcddd1e0ff0b591b0
-
\Users\Public\xiaodaxzqxia\jecxz.exeFilesize
114KB
MD594eb950bbf80edd41f9073ce55a4b08d
SHA11f222a5ccd2b474fbed19d34af5d3607ade5024d
SHA256429952e76c2b06dd9c0a4843f18721dd9daa4c8652657f084b5607aef28e1cd2
SHA5123baefbd7833c4b6f009bc8b6e7a152463e9dfb981271ecbffe00251c841a60f379895c77139a36f92e72dc09b578b9b4a3e0c7eac34ba6afcddd1e0ff0b591b0
-
\Users\Public\xiaodaxzqxia\v.exeFilesize
142KB
MD5bbaea75e78b80434b7cd699749b93a97
SHA1c7d151758cb88dee39dbb5f4cd30e7d226980dde
SHA256c9a1c52f5f5c8deef76b8e989c6a377f00061fa369cbd1cee7f53f8f03295f5c
SHA5127f41846d61452c73566554ba5f6ef356e757ff4c292ad68bbcc1b84f736c02c6b0bc52e13270e5d7be4cde743d40cfc281028d4a0e322fbeecd9b786d08bac3d
-
\Users\Public\xiaodaxzqxia\v.exeFilesize
142KB
MD5bbaea75e78b80434b7cd699749b93a97
SHA1c7d151758cb88dee39dbb5f4cd30e7d226980dde
SHA256c9a1c52f5f5c8deef76b8e989c6a377f00061fa369cbd1cee7f53f8f03295f5c
SHA5127f41846d61452c73566554ba5f6ef356e757ff4c292ad68bbcc1b84f736c02c6b0bc52e13270e5d7be4cde743d40cfc281028d4a0e322fbeecd9b786d08bac3d
-
memory/1428-71-0x0000000000CF0000-0x0000000000D2E000-memory.dmpFilesize
248KB
-
memory/1428-70-0x0000000000CF0000-0x0000000000D2E000-memory.dmpFilesize
248KB
-
memory/1428-72-0x0000000000CF0000-0x0000000000D2E000-memory.dmpFilesize
248KB
-
memory/1604-58-0x0000000000400000-0x000000000058A200-memory.dmpFilesize
1.5MB
-
memory/1604-69-0x00000000029C0000-0x00000000029FE000-memory.dmpFilesize
248KB
-
memory/1604-54-0x0000000000400000-0x000000000058A200-memory.dmpFilesize
1.5MB
-
memory/1604-67-0x00000000029C0000-0x00000000029FE000-memory.dmpFilesize
248KB
-
memory/1604-88-0x0000000000400000-0x000000000058A200-memory.dmpFilesize
1.5MB
-
memory/1604-89-0x0000000000400000-0x000000000058A200-memory.dmpFilesize
1.5MB
-
memory/1604-92-0x0000000000400000-0x000000000058A200-memory.dmpFilesize
1.5MB
-
memory/1604-95-0x0000000000400000-0x000000000058A200-memory.dmpFilesize
1.5MB