Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 03:34
Static task
static1
Behavioral task
behavioral1
Sample
268d188d7b1f70bf429b088ee2ea249d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
268d188d7b1f70bf429b088ee2ea249d.exe
Resource
win10v2004-20231215-en
General
-
Target
268d188d7b1f70bf429b088ee2ea249d.exe
-
Size
14KB
-
MD5
268d188d7b1f70bf429b088ee2ea249d
-
SHA1
6fcd0f5b0daf293ebb28a358ca4b43a828ca917f
-
SHA256
f4247e8555a5e4392dbf67566d5a8796741ef259ed1ad17cce7ed9e2d46b35fc
-
SHA512
7d456dc5518e02dd506ea0f4c162daff36d07e1ecee87c24af4fe8b2ddceb950cb9da5a8b99ea51020a66153e62a1f1873432d46b47defa8610babbd7fbecaa5
-
SSDEEP
384:ekmIM4hZjFnEsO1jlUs0/mPZR1z5G3lJIh:OuJnEs6mh/a75q2
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\gdjyicnt.dll = "{434FA69C-5F0A-42e1-82B8-10AF2C8E53C6}" 268d188d7b1f70bf429b088ee2ea249d.exe -
Deletes itself 1 IoCs
pid Process 2868 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2932 268d188d7b1f70bf429b088ee2ea249d.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\gdjyicnt.nls 268d188d7b1f70bf429b088ee2ea249d.exe File created C:\Windows\SysWOW64\gdjyicnt.tmp 268d188d7b1f70bf429b088ee2ea249d.exe File opened for modification C:\Windows\SysWOW64\gdjyicnt.tmp 268d188d7b1f70bf429b088ee2ea249d.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{434FA69C-5F0A-42e1-82B8-10AF2C8E53C6} 268d188d7b1f70bf429b088ee2ea249d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{434FA69C-5F0A-42e1-82B8-10AF2C8E53C6}\InProcServer32 268d188d7b1f70bf429b088ee2ea249d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{434FA69C-5F0A-42e1-82B8-10AF2C8E53C6}\InProcServer32\ = "C:\\Windows\\SysWow64\\gdjyicnt.dll" 268d188d7b1f70bf429b088ee2ea249d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{434FA69C-5F0A-42e1-82B8-10AF2C8E53C6}\InProcServer32\ThreadingModel = "Apartment" 268d188d7b1f70bf429b088ee2ea249d.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2932 268d188d7b1f70bf429b088ee2ea249d.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2932 268d188d7b1f70bf429b088ee2ea249d.exe 2932 268d188d7b1f70bf429b088ee2ea249d.exe 2932 268d188d7b1f70bf429b088ee2ea249d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2868 2932 268d188d7b1f70bf429b088ee2ea249d.exe 28 PID 2932 wrote to memory of 2868 2932 268d188d7b1f70bf429b088ee2ea249d.exe 28 PID 2932 wrote to memory of 2868 2932 268d188d7b1f70bf429b088ee2ea249d.exe 28 PID 2932 wrote to memory of 2868 2932 268d188d7b1f70bf429b088ee2ea249d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\268d188d7b1f70bf429b088ee2ea249d.exe"C:\Users\Admin\AppData\Local\Temp\268d188d7b1f70bf429b088ee2ea249d.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\88BF.tmp.bat2⤵
- Deletes itself
PID:2868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
179B
MD59883c33929174aafc7e25c72c1cb19b2
SHA14a3d9c8c7676d61a3905c859a719c81dfbeb9abd
SHA256a460a73e8929716ac524c56b05bd68acc5ed29c4ab67808c3b6bba40c5923c9a
SHA512cda5f6fd8f7bdbc07e4437980dab422d64fa21905db9ea7b2924623fa3cd1135975659c677264b9fe082a352a8ba5f27f72f97900467de6f9a5af50129991bc5
-
Filesize
640KB
MD5cfd8e549ba077d0e28d75c389accc30e
SHA179a2b9ceaac3300ce21c8cdb195993c9f42aabca
SHA2560b7d55811aec5ffe542867e58461e9d78b070697a2640b61ffb5885458594335
SHA51253e1f3912bd4b9dcd257e1896058aaf077bd135b36654ec8736bde480b6c38c5a1e94ff9b2df2e1dfcea6c773d7af07097b47d97a10426252b94db71225bdf11
-
Filesize
448KB
MD5faccab5a0426c2547192b2a350fd3208
SHA129680b4f3b5ee0a6d303f856cb2927292dcb00da
SHA2562e9a73192727aadf2f986ea32df164b146c07cf5745da2732537344f74f0cf01
SHA512a2c1dc501a23dcc972b87ede0975c4324d9ac34502fd6813a38fb319766aa85c18cc80e1ebc822f66a67a2c61fedc329602b52889a02bf1250d79f0a9357c152