Analysis
-
max time kernel
92s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 17:04
Static task
static1
Behavioral task
behavioral1
Sample
fb028a6b703ac868fd028cf8e312f2a2.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
fb028a6b703ac868fd028cf8e312f2a2.exe
Resource
win10v2004-20231215-en
Errors
General
-
Target
fb028a6b703ac868fd028cf8e312f2a2.exe
-
Size
3.0MB
-
MD5
fb028a6b703ac868fd028cf8e312f2a2
-
SHA1
c325fc3b68b3f5b42911573ada95917f8577ed93
-
SHA256
5bf0aaaea17c221f29df276cf026f174195c33471ecc482047f6646fe9291f71
-
SHA512
ed7889e0abac786725e4a90e254bc57cf441d08b577a97ff196e64ff43aead391f9f8cb127005b4e6b5cb54e46180972b002064be319b07886540e9234bb62d5
-
SSDEEP
24576:+7QFRUm/rCYAj8pXU+Cz6odAj8pXU+Cz6oqrCYAj8pXU+Cz6odh/rCYAj8pXU+CI:EQFRHrmQG+rQG+rrmQG+urmQG+9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2308 jfykac.exe -
Loads dropped DLL 2 IoCs
pid Process 2196 fb028a6b703ac868fd028cf8e312f2a2.exe 2196 fb028a6b703ac868fd028cf8e312f2a2.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main jfykac.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2308 jfykac.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2308 jfykac.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2308 jfykac.exe 2308 jfykac.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2308 2196 fb028a6b703ac868fd028cf8e312f2a2.exe 28 PID 2196 wrote to memory of 2308 2196 fb028a6b703ac868fd028cf8e312f2a2.exe 28 PID 2196 wrote to memory of 2308 2196 fb028a6b703ac868fd028cf8e312f2a2.exe 28 PID 2196 wrote to memory of 2308 2196 fb028a6b703ac868fd028cf8e312f2a2.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb028a6b703ac868fd028cf8e312f2a2.exe"C:\Users\Admin\AppData\Local\Temp\fb028a6b703ac868fd028cf8e312f2a2.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\jfykac.exeC:\Users\Admin\AppData\Local\Temp\jfykac.exe -run C:\Users\Admin\AppData\Local\Temp\fb028a6b703ac868fd028cf8e312f2a2.exe2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD512a1aa4be0f529113bd6bd3498a79f15
SHA19981b670ae8238c20727474a126e11cedf8d2296
SHA2564f7b0668f79190216b58530396c95b88dfd9e0a57d190b53c586c69fa52d5d24
SHA51265aa126b25f3a89b8c90262c9f460d2c9324889e9f337876807420fe29144111dfc57117953c791f2fb4d4fac6aa77907edb3e185da4bd35f344107a6a9a90c7
-
Filesize
456KB
MD5eea66b2761f4c4544d7ff8f2c3c663f0
SHA1c856e4bb63b9e2f199e23fb820ab10067e0bbc4a
SHA2568fe5567016c5433678be1ab9eec00e7e30f91dca1e9de9b9f2f2d967a3ea8b75
SHA5124945c81f366b50661a021cf5893b52b796b4d455bd457a65e7736c566ed6d44335f60cf275e1cc0da3edbca0127cf8bb212ff185852886870a1af49c7143d23e
-
Filesize
1.4MB
MD5452943404dd0c14b4274222cf1c12d96
SHA188256340e7eadd5755e7624ff73545f4c361904c
SHA256c5e3a6658f7e8816bfb6bb446e763bc2e11480901421a76fdc274b1b65052686
SHA512d7caffe085ab98a923aeaba0309c151687e30eb9be60e29ae1432bf196070df38b7bcb87400b557247ce360d690db4c08dbea22295d3adca19e7bf31c396ff1c
-
Filesize
991KB
MD5c43a805e6af4c8cb3b94b9bb51fc891f
SHA159d08eaa7dba91a88df094cbce082fa2573e4be8
SHA256950285b3b440dfe220fcb5e13d9ad13bad5e3af97382a08359f58feb023e683b
SHA5122ee040cc8ef370c8bc798e1e1fef9a639f62f3727d025f0efcf3741de55dfc8f16fb82b89ae947d1bf0e6f7357c41fbedcbb04da3bfff70331c0febdd348684a