Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 03:27
Behavioral task
behavioral1
Sample
0cf18f407a5ef886e135750c7ed756cf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0cf18f407a5ef886e135750c7ed756cf.exe
Resource
win10v2004-20231215-en
General
-
Target
0cf18f407a5ef886e135750c7ed756cf.exe
-
Size
12KB
-
MD5
0cf18f407a5ef886e135750c7ed756cf
-
SHA1
578364476837ae2999d70358b7fd539e6d0c190b
-
SHA256
6b162925ebfcfb31cbce697bfd2de2a73ebea8b47a4ebf6fdd5eedf5e015f4f4
-
SHA512
3400aa41ece292c72403d24022f0218bdf51fc2512e2cfc493c3db958920c4a50075edf1b0e77b7d176fec83d7c98d4bea15d0dfe30d23282a4cf9294fa07725
-
SSDEEP
192:v11fy/3+16rV7qwLvA3tu6A5L2QWOpUvwmRNLIKvuRx/eJKL+:d1fy/S6FqJpOpewAny8F
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 1300 jolinenk.exe -
resource yara_rule behavioral2/memory/3404-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/files/0x0006000000023214-4.dat upx behavioral2/memory/3404-6-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/1300-7-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\jolinen.dll 0cf18f407a5ef886e135750c7ed756cf.exe File created C:\Windows\SysWOW64\jolinenk.exe 0cf18f407a5ef886e135750c7ed756cf.exe File opened for modification C:\Windows\SysWOW64\jolinenk.exe 0cf18f407a5ef886e135750c7ed756cf.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3404 wrote to memory of 1300 3404 0cf18f407a5ef886e135750c7ed756cf.exe 89 PID 3404 wrote to memory of 1300 3404 0cf18f407a5ef886e135750c7ed756cf.exe 89 PID 3404 wrote to memory of 1300 3404 0cf18f407a5ef886e135750c7ed756cf.exe 89 PID 3404 wrote to memory of 2804 3404 0cf18f407a5ef886e135750c7ed756cf.exe 101 PID 3404 wrote to memory of 2804 3404 0cf18f407a5ef886e135750c7ed756cf.exe 101 PID 3404 wrote to memory of 2804 3404 0cf18f407a5ef886e135750c7ed756cf.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cf18f407a5ef886e135750c7ed756cf.exe"C:\Users\Admin\AppData\Local\Temp\0cf18f407a5ef886e135750c7ed756cf.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Windows\SysWOW64\jolinenk.exeC:\Windows\system32\jolinenk.exe ˜‰2⤵
- Executes dropped EXE
PID:1300
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\0cf18f407a5ef886e135750c7ed756cf.exe.bat2⤵PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD5f4febde3c6cce89dd101d62072224d50
SHA134ca8f7788af540b5452cf40d39c3d0cf5a839a7
SHA256b60c7ae6021807dd3f2dfabfd249843a4fcc69841d0b3771851e11c0d9eb38c7
SHA5122d97bd175b41c1ddd96d09b75e1dcf0e36d099760fe3eda59b6508e1a90c8f3bd602761b525991dfb2b1d1fbd2473477cd068049ffed141bd14eb6b4375a98fe
-
Filesize
12KB
MD50cf18f407a5ef886e135750c7ed756cf
SHA1578364476837ae2999d70358b7fd539e6d0c190b
SHA2566b162925ebfcfb31cbce697bfd2de2a73ebea8b47a4ebf6fdd5eedf5e015f4f4
SHA5123400aa41ece292c72403d24022f0218bdf51fc2512e2cfc493c3db958920c4a50075edf1b0e77b7d176fec83d7c98d4bea15d0dfe30d23282a4cf9294fa07725