Analysis
-
max time kernel
142s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
28/11/2023, 08:11
Static task
static1
Behavioral task
behavioral1
Sample
IMP-MMO-0208.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
IMP-MMO-0208.exe
Resource
win10v2004-20231127-en
General
-
Target
IMP-MMO-0208.exe
-
Size
346KB
-
MD5
0d6f9bf68f8ddb1be846dfe11dafa819
-
SHA1
a7e4ab95599e17b43571bc21cd98e0b350dc2c59
-
SHA256
df7104bd49961e1ae6e3741221e0cb3b5a8744f945533060910a076fe1aadf66
-
SHA512
bce42022878f77a25342bad3228bf913ba69d1bad09c243f070b19abcf998f44eb37459fc969c657e5d3246923106d546bba16854055ad2180bec120dee7cadb
-
SSDEEP
6144:qBlL/e2xIR8lf98JrWKq/BViyyAt7lKmeiUC8zhoSSMidXI8sSVHkvD8:Q0EfirXqRgZiSS14lSBkQ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Control Panel\International\Geo\Nation ymjhh.exe -
Executes dropped EXE 2 IoCs
pid Process 2888 ymjhh.exe 2088 ymjhh.exe -
Loads dropped DLL 3 IoCs
pid Process 1920 IMP-MMO-0208.exe 1920 IMP-MMO-0208.exe 2888 ymjhh.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2888 set thread context of 2088 2888 ymjhh.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2088 ymjhh.exe 2088 ymjhh.exe 2088 ymjhh.exe 2088 ymjhh.exe 2088 ymjhh.exe 2088 ymjhh.exe 2088 ymjhh.exe 2088 ymjhh.exe 2088 ymjhh.exe 2088 ymjhh.exe 2088 ymjhh.exe 2088 ymjhh.exe 2088 ymjhh.exe 2088 ymjhh.exe 2088 ymjhh.exe 2088 ymjhh.exe 2088 ymjhh.exe 2088 ymjhh.exe 2088 ymjhh.exe 2088 ymjhh.exe 2088 ymjhh.exe 2088 ymjhh.exe 2088 ymjhh.exe 2088 ymjhh.exe 2088 ymjhh.exe 2088 ymjhh.exe 2088 ymjhh.exe 2088 ymjhh.exe 2088 ymjhh.exe 2088 ymjhh.exe 2088 ymjhh.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2888 ymjhh.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2088 ymjhh.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1920 wrote to memory of 2888 1920 IMP-MMO-0208.exe 28 PID 1920 wrote to memory of 2888 1920 IMP-MMO-0208.exe 28 PID 1920 wrote to memory of 2888 1920 IMP-MMO-0208.exe 28 PID 1920 wrote to memory of 2888 1920 IMP-MMO-0208.exe 28 PID 2888 wrote to memory of 2088 2888 ymjhh.exe 29 PID 2888 wrote to memory of 2088 2888 ymjhh.exe 29 PID 2888 wrote to memory of 2088 2888 ymjhh.exe 29 PID 2888 wrote to memory of 2088 2888 ymjhh.exe 29 PID 2888 wrote to memory of 2088 2888 ymjhh.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\IMP-MMO-0208.exe"C:\Users\Admin\AppData\Local\Temp\IMP-MMO-0208.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\ymjhh.exe"C:\Users\Admin\AppData\Local\Temp\ymjhh.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\ymjhh.exe"C:\Users\Admin\AppData\Local\Temp\ymjhh.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD59ad02f7fd59d92d047d76946cfcbe49a
SHA18f5a1a99438068f5cd1fdd11a86686cac4a2ff2d
SHA256fdc4cbc5198c6a135353dcfb42581d94a668a8ab55174c1a1771128e88a2f740
SHA512a29e1d30bec7592868de9138a24c1626fa0a322f335d330f0d7c6300f9c5ec66dc2b6a54084995ef7e73980db5b6fe7cfd1e7c53bdd8497b71a9a384f4a478b3
-
Filesize
176KB
MD5b56ca65f59748ae4066a5ae4989ada3e
SHA18954717bfc89a1b8e64b544fc679537206eec65b
SHA25685206c57b0aeeb7a0ea61106b70e06b75052b003a5b061a00b7cf48b2cecae8e
SHA51216f2f7aef1585bd9374af01110721ce3ae0b973d4c080032ef98dc1c008f6d493a94d58f6abc4728ec7bcf4f59022c7b9f9bb81d1a10f712a19cd369cf598b80
-
Filesize
176KB
MD5b56ca65f59748ae4066a5ae4989ada3e
SHA18954717bfc89a1b8e64b544fc679537206eec65b
SHA25685206c57b0aeeb7a0ea61106b70e06b75052b003a5b061a00b7cf48b2cecae8e
SHA51216f2f7aef1585bd9374af01110721ce3ae0b973d4c080032ef98dc1c008f6d493a94d58f6abc4728ec7bcf4f59022c7b9f9bb81d1a10f712a19cd369cf598b80
-
Filesize
176KB
MD5b56ca65f59748ae4066a5ae4989ada3e
SHA18954717bfc89a1b8e64b544fc679537206eec65b
SHA25685206c57b0aeeb7a0ea61106b70e06b75052b003a5b061a00b7cf48b2cecae8e
SHA51216f2f7aef1585bd9374af01110721ce3ae0b973d4c080032ef98dc1c008f6d493a94d58f6abc4728ec7bcf4f59022c7b9f9bb81d1a10f712a19cd369cf598b80
-
Filesize
176KB
MD5b56ca65f59748ae4066a5ae4989ada3e
SHA18954717bfc89a1b8e64b544fc679537206eec65b
SHA25685206c57b0aeeb7a0ea61106b70e06b75052b003a5b061a00b7cf48b2cecae8e
SHA51216f2f7aef1585bd9374af01110721ce3ae0b973d4c080032ef98dc1c008f6d493a94d58f6abc4728ec7bcf4f59022c7b9f9bb81d1a10f712a19cd369cf598b80
-
Filesize
176KB
MD5b56ca65f59748ae4066a5ae4989ada3e
SHA18954717bfc89a1b8e64b544fc679537206eec65b
SHA25685206c57b0aeeb7a0ea61106b70e06b75052b003a5b061a00b7cf48b2cecae8e
SHA51216f2f7aef1585bd9374af01110721ce3ae0b973d4c080032ef98dc1c008f6d493a94d58f6abc4728ec7bcf4f59022c7b9f9bb81d1a10f712a19cd369cf598b80
-
Filesize
176KB
MD5b56ca65f59748ae4066a5ae4989ada3e
SHA18954717bfc89a1b8e64b544fc679537206eec65b
SHA25685206c57b0aeeb7a0ea61106b70e06b75052b003a5b061a00b7cf48b2cecae8e
SHA51216f2f7aef1585bd9374af01110721ce3ae0b973d4c080032ef98dc1c008f6d493a94d58f6abc4728ec7bcf4f59022c7b9f9bb81d1a10f712a19cd369cf598b80
-
Filesize
176KB
MD5b56ca65f59748ae4066a5ae4989ada3e
SHA18954717bfc89a1b8e64b544fc679537206eec65b
SHA25685206c57b0aeeb7a0ea61106b70e06b75052b003a5b061a00b7cf48b2cecae8e
SHA51216f2f7aef1585bd9374af01110721ce3ae0b973d4c080032ef98dc1c008f6d493a94d58f6abc4728ec7bcf4f59022c7b9f9bb81d1a10f712a19cd369cf598b80