Overview
overview
3Static
static
3LexunCommon.dll
debian-9-armhf
SJ.Cmd.dll
windows7-x64
1SJ.Cmd.dll
windows10-2004-x64
1SJ.Http.dll
windows7-x64
1SJ.Http.dll
windows10-2004-x64
1SJ.IROOT.exe
windows7-x64
1SJ.IROOT.exe
windows10-2004-x64
1SJ.Info.dll
windows7-x64
1SJ.Info.dll
windows10-2004-x64
1SJ.Util.dll
windows7-x64
1SJ.Util.dll
windows10-2004-x64
1Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 14:16
Static task
static1
Behavioral task
behavioral1
Sample
LexunCommon.dll
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral2
Sample
SJ.Cmd.dll
Resource
win7-20231215-en
Behavioral task
behavioral3
Sample
SJ.Cmd.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral4
Sample
SJ.Http.dll
Resource
win7-20231215-en
Behavioral task
behavioral5
Sample
SJ.Http.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral6
Sample
SJ.IROOT.exe
Resource
win7-20231215-en
Behavioral task
behavioral7
Sample
SJ.IROOT.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral8
Sample
SJ.Info.dll
Resource
win7-20231215-en
Behavioral task
behavioral9
Sample
SJ.Info.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral10
Sample
SJ.Util.dll
Resource
win7-20231129-en
Behavioral task
behavioral11
Sample
SJ.Util.dll
Resource
win10v2004-20231215-en
General
-
Target
SJ.IROOT.exe
-
Size
408KB
-
MD5
35b6d933c1ff2be2e9f3f399b8ea7e2a
-
SHA1
6ba2e9470d9c1f0740ebac28ce9b569ae1b90a5d
-
SHA256
0c5b928f8080d26dab92bb125eb629458575c7cf4e6e8e1c4395cc5d82680ccd
-
SHA512
9a05d7c2898c4e5986e81ade0526984a9a628b3d328affc4cbc18ebcb37f555441fa9d35264322dca23862bbb9974db5a2047c75b7ba58ae2e7394c21a402893
-
SSDEEP
12288:R3yRKJMu+FC/92+JWN6UB382B2Ujsur2Ceinhk5f:ZyJF7+JWN6UR4i2Ceinhk5f
Malware Config
Signatures
-
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 1184 NETSTAT.EXE 3316 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3324 SJ.IROOT.exe Token: SeDebugPrivilege 3316 NETSTAT.EXE Token: SeDebugPrivilege 1184 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3324 wrote to memory of 4544 3324 SJ.IROOT.exe 99 PID 3324 wrote to memory of 4544 3324 SJ.IROOT.exe 99 PID 3324 wrote to memory of 4544 3324 SJ.IROOT.exe 99 PID 4544 wrote to memory of 3316 4544 cmd.exe 98 PID 4544 wrote to memory of 3316 4544 cmd.exe 98 PID 4544 wrote to memory of 3316 4544 cmd.exe 98 PID 4544 wrote to memory of 372 4544 cmd.exe 97 PID 4544 wrote to memory of 372 4544 cmd.exe 97 PID 4544 wrote to memory of 372 4544 cmd.exe 97 PID 3324 wrote to memory of 1204 3324 SJ.IROOT.exe 96 PID 3324 wrote to memory of 1204 3324 SJ.IROOT.exe 96 PID 3324 wrote to memory of 1204 3324 SJ.IROOT.exe 96 PID 1204 wrote to memory of 1184 1204 cmd.exe 95 PID 1204 wrote to memory of 1184 1204 cmd.exe 95 PID 1204 wrote to memory of 1184 1204 cmd.exe 95 PID 1204 wrote to memory of 64 1204 cmd.exe 94 PID 1204 wrote to memory of 64 1204 cmd.exe 94 PID 1204 wrote to memory of 64 1204 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\SJ.IROOT.exe"C:\Users\Admin\AppData\Local\Temp\SJ.IROOT.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1204
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4544
-
-
C:\Windows\SysWOW64\findstr.exefindstr "5037"1⤵PID:64
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -ano1⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:1184
-
C:\Windows\SysWOW64\findstr.exefindstr "5037"1⤵PID:372
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -ano1⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:3316