Analysis
-
max time kernel
93s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2024 00:13
Behavioral task
behavioral1
Sample
666719c30824cb9cfc497abe69f78064.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
666719c30824cb9cfc497abe69f78064.exe
Resource
win10v2004-20231215-en
General
-
Target
666719c30824cb9cfc497abe69f78064.exe
-
Size
37KB
-
MD5
666719c30824cb9cfc497abe69f78064
-
SHA1
2cfc565d60691adbbfcb15b25b86ddb3b3ee712d
-
SHA256
df279820902ab7b30e2672f984f80a8e50531697a8b921b09b9a1cacb633c4d3
-
SHA512
c0cdd26ea5d4391d52e0a344055e771286c37a4f54515312b002786e1beceabcc08eba4b709171f087c37e573bc4deaf9013956e8dac8aee9cc1b7ba3bd8fbef
-
SSDEEP
768:vjdRiSA6RUHV7qaWX4VfM4xddzkpxtq5hgBD4IlimumUqvDORNt:7dy6a7q5XqfM49axU5iimxUqvKR
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\tjiz.sys 666719c30824cb9cfc497abe69f78064.exe File opened for modification C:\Windows\SysWOW64\drivers\tjiz.sys 666719c30824cb9cfc497abe69f78064.exe -
resource yara_rule behavioral2/memory/3228-0-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3228-9-0x0000000000400000-0x000000000041C000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\yizlIq.dll 666719c30824cb9cfc497abe69f78064.exe File opened for modification C:\Windows\SysWOW64\yizlIq.dll 666719c30824cb9cfc497abe69f78064.exe File created C:\Windows\SysWOW64\fNR0h5.bat 666719c30824cb9cfc497abe69f78064.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1380 PING.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 660 Process not Found -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3228 wrote to memory of 2484 3228 666719c30824cb9cfc497abe69f78064.exe 72 PID 3228 wrote to memory of 2484 3228 666719c30824cb9cfc497abe69f78064.exe 72 PID 3228 wrote to memory of 2484 3228 666719c30824cb9cfc497abe69f78064.exe 72 PID 2484 wrote to memory of 1380 2484 cmd.exe 74 PID 2484 wrote to memory of 1380 2484 cmd.exe 74 PID 2484 wrote to memory of 1380 2484 cmd.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\666719c30824cb9cfc497abe69f78064.exe"C:\Users\Admin\AppData\Local\Temp\666719c30824cb9cfc497abe69f78064.exe"1⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\fNR0h5.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\PING.EXEping -n 3 127.0.0.13⤵
- Runs ping.exe
PID:1380
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
221B
MD554a9f836ac5abc2e9b0bc8fae3cc34d1
SHA1afbfa0e4ac88e9124a14fbe45490891a33b16c91
SHA256eea5e607287909101e7fda840e633149df8fa547b2e11be9fb3ef6979c3269fc
SHA5126cf616f3a92bc02e4f43a4843524555bea93b3e3fb31b7c0a63de913c839e5461a81e3fdd57bc3f8d1bbca508efaba1342717d83c13b2de0e6e5fd778e9f05f4