Analysis
-
max time kernel
148s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 07:21
Static task
static1
Behavioral task
behavioral1
Sample
2d319ee7238baaa7fb63b390fcca0208.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2d319ee7238baaa7fb63b390fcca0208.exe
Resource
win10v2004-20231215-en
General
-
Target
2d319ee7238baaa7fb63b390fcca0208.exe
-
Size
276KB
-
MD5
2d319ee7238baaa7fb63b390fcca0208
-
SHA1
292d4e475fcc531ebd4b77e159bb7b5b0b94ce40
-
SHA256
a9257112f389b71d065b215d5cf620a986ab06f3c2a20966ac753d1e79b0e671
-
SHA512
d2a12e7f703bee6f6cfc232374c6721a46d4e0c05912fda6fb7bf2fd6b0f892e9e16b3239def7db4526d860639456f4cdc2e795fa267a90c9054da4cb6a239d7
-
SSDEEP
6144:qvDpzJZdleUZHcpk44yY8QoCQG/iXygD:AJnzZtTybQ5zayM
Malware Config
Signatures
-
Disables taskbar notifications via registry modification
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Deletes itself 1 IoCs
pid Process 2632 fji.exe -
Executes dropped EXE 1 IoCs
pid Process 2632 fji.exe -
Loads dropped DLL 2 IoCs
pid Process 1912 2d319ee7238baaa7fb63b390fcca0208.exe 1912 2d319ee7238baaa7fb63b390fcca0208.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1912 2d319ee7238baaa7fb63b390fcca0208.exe 1912 2d319ee7238baaa7fb63b390fcca0208.exe 1912 2d319ee7238baaa7fb63b390fcca0208.exe 1912 2d319ee7238baaa7fb63b390fcca0208.exe 1912 2d319ee7238baaa7fb63b390fcca0208.exe 1912 2d319ee7238baaa7fb63b390fcca0208.exe 1912 2d319ee7238baaa7fb63b390fcca0208.exe 1912 2d319ee7238baaa7fb63b390fcca0208.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2692 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2692 explorer.exe Token: SeShutdownPrivilege 2692 explorer.exe Token: SeShutdownPrivilege 2692 explorer.exe Token: SeShutdownPrivilege 2692 explorer.exe Token: SeShutdownPrivilege 2692 explorer.exe Token: SeShutdownPrivilege 2692 explorer.exe Token: SeShutdownPrivilege 2692 explorer.exe Token: SeShutdownPrivilege 2692 explorer.exe Token: SeShutdownPrivilege 2692 explorer.exe Token: SeShutdownPrivilege 2692 explorer.exe Token: SeShutdownPrivilege 2692 explorer.exe Token: SeShutdownPrivilege 2692 explorer.exe -
Suspicious use of FindShellTrayWindow 30 IoCs
pid Process 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe -
Suspicious use of SendNotifyMessage 23 IoCs
pid Process 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe 2692 explorer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1912 wrote to memory of 2632 1912 2d319ee7238baaa7fb63b390fcca0208.exe 28 PID 1912 wrote to memory of 2632 1912 2d319ee7238baaa7fb63b390fcca0208.exe 28 PID 1912 wrote to memory of 2632 1912 2d319ee7238baaa7fb63b390fcca0208.exe 28 PID 1912 wrote to memory of 2632 1912 2d319ee7238baaa7fb63b390fcca0208.exe 28 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d319ee7238baaa7fb63b390fcca0208.exe"C:\Users\Admin\AppData\Local\Temp\2d319ee7238baaa7fb63b390fcca0208.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\fji.exe"C:\Users\Admin\AppData\Local\fji.exe" -gav C:\Users\Admin\AppData\Local\Temp\2d319ee7238baaa7fb63b390fcca0208.exe2⤵
- Deletes itself
- Executes dropped EXE
PID:2632
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
276KB
MD52d319ee7238baaa7fb63b390fcca0208
SHA1292d4e475fcc531ebd4b77e159bb7b5b0b94ce40
SHA256a9257112f389b71d065b215d5cf620a986ab06f3c2a20966ac753d1e79b0e671
SHA512d2a12e7f703bee6f6cfc232374c6721a46d4e0c05912fda6fb7bf2fd6b0f892e9e16b3239def7db4526d860639456f4cdc2e795fa267a90c9054da4cb6a239d7