Analysis

  • max time kernel
    156s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 00:16

General

  • Target

    215ca84e60f21a4413e3ce5d24533e58.exe

  • Size

    37KB

  • MD5

    215ca84e60f21a4413e3ce5d24533e58

  • SHA1

    e3c8cbfc0045a2f9035b4fd1a674739151eafa14

  • SHA256

    c2c89583aed470465e582aa40a11102f9257e60a99b7f5c7370a485f9ad7d659

  • SHA512

    72ad140fa233c40fd68d6fd02f1dd487bc9e0834062348c4844d8a598907998f920e04dfd7190ab05a3a6df8b324cad41fc7128f052462474001dec584d2f8a4

  • SSDEEP

    768:De+yQkCn+pRT8Pp2MSsHn+YWI7iFPnv79qfK6IZyXwBaR1FOlkh0y1aTPY:EQxn+pp8Q3KnfWI2FPnTwf/IZyH1uczT

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Sets file execution options in registry 2 TTPs 6 IoCs
  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 22 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\215ca84e60f21a4413e3ce5d24533e58.exe
    "C:\Users\Admin\AppData\Local\Temp\215ca84e60f21a4413e3ce5d24533e58.exe"
    1⤵
    • Adds policy Run key to start application
    • Sets file execution options in registry
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\program files\internet explorer\iexplore.exe
      "C:\program files\internet explorer\iexplore.exe"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1588
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1588 CREDAT:17410 /prefetch:2
        3⤵
          PID:3288
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c del "C:\Users\Admin\AppData\Local\Temp\215ca84e60f21a4413e3ce5d24533e58.exe"
        2⤵
          PID:2396

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\ProgramData\jjjydf16.ini

              Filesize

              86B

              MD5

              f5670a19bb2c9f925287e60ec0cd3f2e

              SHA1

              c14377ae67a6150e75801d5d9cedceb8aab1cb87

              SHA256

              1d7b5eaea755a8fbe3ee6361d5d65e998aa0e8c0f758d42c74c6fd18514977dc

              SHA512

              4d3e41d6aac37a21ff1fad1d7e18e659c2506359a991596c742979adfe881014520f5ff5feb98b0ce5a31b488fdd76c70852189bedc6d8866e407ffb5e24ad36