Analysis

  • max time kernel
    148s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    18/01/2024, 17:49

General

  • Target

    65a6a7eb140ac1c9ef0036af6880645a.exe

  • Size

    288KB

  • MD5

    65a6a7eb140ac1c9ef0036af6880645a

  • SHA1

    495a0a275b06b7db09b20adf32085d143143c590

  • SHA256

    20bfa115a8606b230d4e6a1fc7ca7fda8f623b0a783a0cfbfa09201a8ba63909

  • SHA512

    5595ddaafbb64f169a2af0b55ef96414b325505ae40c5aec169be0a8c2bfadf2e3dc594714f89829a8597de479cda1b746fb3784bc7f3632c75158e26a162795

  • SSDEEP

    6144:wejcki1BSRm6W2k5F0f2t6b+vClRHUcivtJOkRGP07ByaB22U9F/R:wejckifOm67oFZt6KqlKRvtJOkRGmwtJ

Malware Config

Signatures

  • Disables taskbar notifications via registry modification
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 17 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies registry class 41 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 20 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\65a6a7eb140ac1c9ef0036af6880645a.exe
    "C:\Users\Admin\AppData\Local\Temp\65a6a7eb140ac1c9ef0036af6880645a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2948
    • C:\Users\Admin\AppData\Local\jfj.exe
      "C:\Users\Admin\AppData\Local\jfj.exe" -gav C:\Users\Admin\AppData\Local\Temp\65a6a7eb140ac1c9ef0036af6880645a.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2196
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Modifies Installed Components in the registry
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1976

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\jfj.exe

          Filesize

          288KB

          MD5

          a73e1620b8278f3a9d40e362654556cd

          SHA1

          26edc08f6e04419ad39c9d5431727af959e866b8

          SHA256

          2f2f860bdf4a0e1984422e9abedfadbcf64fbdd5c642361f55116e007c3dd2c4

          SHA512

          8eeae100ab705708c03b66f85cf982645447b40b5a1466d958ff78a9d8430a9638ae888f54d883ec9ef6864d2d1671baaf2a22231ee637a1872b4e7033b17bc2

        • \Users\Admin\AppData\Local\jfj.exe

          Filesize

          41KB

          MD5

          636ff03b241e36047f7e42f55b28dd8d

          SHA1

          6c40b90a9cf451ef72305046e58c53d1e741e867

          SHA256

          b57a852da09411bb066b6fde6e8e50814d782fd129061944d14f2e575d959cb8

          SHA512

          5c95fb7936539a4fd1462fb53a2d9f3a545d0345d204c71f81f8aa2a3f3d8c620bbf157bcf20a6a7bdfd147fa9c96672aaf3bd3754edc8aae5ce8244df8bb4d0

        • memory/1976-51-0x0000000002A20000-0x0000000002A30000-memory.dmp

          Filesize

          64KB

        • memory/1976-25-0x0000000004000000-0x0000000004001000-memory.dmp

          Filesize

          4KB

        • memory/1976-17-0x0000000004000000-0x0000000004001000-memory.dmp

          Filesize

          4KB

        • memory/2196-41-0x0000000000400000-0x00000000005F7000-memory.dmp

          Filesize

          2.0MB

        • memory/2196-28-0x0000000000400000-0x00000000005F7000-memory.dmp

          Filesize

          2.0MB

        • memory/2196-54-0x0000000000400000-0x00000000005F7000-memory.dmp

          Filesize

          2.0MB

        • memory/2196-52-0x0000000000400000-0x00000000005F7000-memory.dmp

          Filesize

          2.0MB

        • memory/2196-18-0x0000000000400000-0x00000000005F7000-memory.dmp

          Filesize

          2.0MB

        • memory/2196-19-0x0000000000290000-0x0000000000291000-memory.dmp

          Filesize

          4KB

        • memory/2196-20-0x00000000001D0000-0x00000000001D1000-memory.dmp

          Filesize

          4KB

        • memory/2196-22-0x0000000000400000-0x00000000005F7000-memory.dmp

          Filesize

          2.0MB

        • memory/2196-24-0x00000000002A0000-0x00000000002A1000-memory.dmp

          Filesize

          4KB

        • memory/2196-26-0x00000000002B0000-0x00000000002B1000-memory.dmp

          Filesize

          4KB

        • memory/2196-49-0x0000000000400000-0x00000000005F7000-memory.dmp

          Filesize

          2.0MB

        • memory/2196-15-0x00000000001C0000-0x00000000001C6000-memory.dmp

          Filesize

          24KB

        • memory/2196-30-0x0000000000400000-0x00000000005F7000-memory.dmp

          Filesize

          2.0MB

        • memory/2196-32-0x0000000000400000-0x00000000005F7000-memory.dmp

          Filesize

          2.0MB

        • memory/2196-37-0x0000000000400000-0x00000000005F7000-memory.dmp

          Filesize

          2.0MB

        • memory/2196-39-0x0000000000400000-0x00000000005F7000-memory.dmp

          Filesize

          2.0MB

        • memory/2196-47-0x0000000000400000-0x00000000005F7000-memory.dmp

          Filesize

          2.0MB

        • memory/2196-43-0x0000000000400000-0x00000000005F7000-memory.dmp

          Filesize

          2.0MB

        • memory/2196-45-0x0000000000400000-0x00000000005F7000-memory.dmp

          Filesize

          2.0MB

        • memory/2948-0-0x0000000000220000-0x0000000000229000-memory.dmp

          Filesize

          36KB

        • memory/2948-1-0x0000000000230000-0x0000000000236000-memory.dmp

          Filesize

          24KB

        • memory/2948-2-0x0000000000400000-0x00000000005F7000-memory.dmp

          Filesize

          2.0MB

        • memory/2948-4-0x0000000002350000-0x0000000002607000-memory.dmp

          Filesize

          2.7MB

        • memory/2948-16-0x0000000000400000-0x00000000005F7000-memory.dmp

          Filesize

          2.0MB