Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 17:10
Static task
static1
Behavioral task
behavioral1
Sample
034439a3903a3cb01290ef335311072f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
034439a3903a3cb01290ef335311072f.exe
Resource
win10v2004-20231215-en
General
-
Target
034439a3903a3cb01290ef335311072f.exe
-
Size
14KB
-
MD5
034439a3903a3cb01290ef335311072f
-
SHA1
9ecd86b339bb6451315439b29f27b8cc3f45d3cd
-
SHA256
f8fe14418220afc5a0715d0403562fa5fe4de7a9b19de95e68aa7ffa10905502
-
SHA512
96df9fc21bb2ef296a8379ac6a3e14674b266be470359583400936744736c676fca6f0e36f395c525817ab94a30cf19e0a40f538fedd6198677773e6c3510049
-
SSDEEP
384:kKtBT+TlFk7akcmfc9+Ces4BpFN0dWhiYrHox3lMf:kgBqhFkFcmUH2QduJf
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\jcxvnrlq.dll = "{21BE5FDF-D4CB-4850-AD99-21E68B50BF3F}" 034439a3903a3cb01290ef335311072f.exe -
Deletes itself 1 IoCs
pid Process 2624 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2532 034439a3903a3cb01290ef335311072f.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\jcxvnrlq.tmp 034439a3903a3cb01290ef335311072f.exe File opened for modification C:\Windows\SysWOW64\jcxvnrlq.tmp 034439a3903a3cb01290ef335311072f.exe File opened for modification C:\Windows\SysWOW64\jcxvnrlq.nls 034439a3903a3cb01290ef335311072f.exe -
Modifies registry class 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21BE5FDF-D4CB-4850-AD99-21E68B50BF3F}\InProcServer32\ = "C:\\Windows\\SysWow64\\jcxvnrlq.dll" 034439a3903a3cb01290ef335311072f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21BE5FDF-D4CB-4850-AD99-21E68B50BF3F}\InProcServer32\ThreadingModel = "Apartment" 034439a3903a3cb01290ef335311072f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21BE5FDF-D4CB-4850-AD99-21E68B50BF3F} 034439a3903a3cb01290ef335311072f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21BE5FDF-D4CB-4850-AD99-21E68B50BF3F}\InProcServer32 034439a3903a3cb01290ef335311072f.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2532 034439a3903a3cb01290ef335311072f.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2532 034439a3903a3cb01290ef335311072f.exe 2532 034439a3903a3cb01290ef335311072f.exe 2532 034439a3903a3cb01290ef335311072f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2624 2532 034439a3903a3cb01290ef335311072f.exe 28 PID 2532 wrote to memory of 2624 2532 034439a3903a3cb01290ef335311072f.exe 28 PID 2532 wrote to memory of 2624 2532 034439a3903a3cb01290ef335311072f.exe 28 PID 2532 wrote to memory of 2624 2532 034439a3903a3cb01290ef335311072f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\034439a3903a3cb01290ef335311072f.exe"C:\Users\Admin\AppData\Local\Temp\034439a3903a3cb01290ef335311072f.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\820B.tmp.bat2⤵
- Deletes itself
PID:2624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
179B
MD5f5a0dc92847106dca5b5fdf7d74c0e0c
SHA17742fc9619ab7483334420b0d11ef76f959a32d8
SHA256b0cf4c97013fd6b43f88a8e1d6eef8930ec7f726e5aec55b473c089e149605e5
SHA5127c67252109b774c0592072df31f9d51315320d9e7ffdceeb056f9d34b72f4f9cc2f5f20a5e0913015c0b0baf28193bbfc25d792879b52a9e1e1c3fd4c3675a47
-
Filesize
717KB
MD57c6444e92ceadfc1924bf38735dd678a
SHA134ffab9a2f2c3543f3e8e5b1d94aa1226a716e2b
SHA25624a9d07c76f06a7f0907bdb432bbdbdcc32a5cf7f28674df94ad532837966cbc
SHA5129d256df3c3c98ea4e2651699ff3766894014416e2402780b66fecb3e80cb1ecd16265222c7d960e07ef31f47f45fea0382ed4d9a0d0cfb81ede733eba11750de