Analysis
-
max time kernel
150s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 11:21
Behavioral task
behavioral1
Sample
677ee056ff39ca2c093446c35e198113.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
677ee056ff39ca2c093446c35e198113.exe
Resource
win10v2004-20231215-en
General
-
Target
677ee056ff39ca2c093446c35e198113.exe
-
Size
11KB
-
MD5
677ee056ff39ca2c093446c35e198113
-
SHA1
89059ebcac5d3b18a0cd001742294c628057b393
-
SHA256
93b3b878974283e468af8f857d7730587bcb6a5a366a705bea77a3781e315956
-
SHA512
b0d627c1e68cbad96dd1098c761115750fc7714d6972f72db5b167470e3b5e0835641dadf12ecf5a0e1b254d9a65180d4794593ea08b76080610bd499083e8b5
-
SSDEEP
192:OLoXm0xffvqKPRhtJIIfh+TLNsqDWo/Ib1lnwPzGE4ZwhcOAbmg:OUXm45POmh+vygWoEObYkb/g
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Deletes itself 1 IoCs
pid Process 2880 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3028 jolinosk.exe -
Loads dropped DLL 2 IoCs
pid Process 880 677ee056ff39ca2c093446c35e198113.exe 880 677ee056ff39ca2c093446c35e198113.exe -
resource yara_rule behavioral1/memory/880-0-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/files/0x0009000000015ca3-3.dat upx behavioral1/memory/3028-11-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/880-12-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\jolinos.dll 677ee056ff39ca2c093446c35e198113.exe File created C:\Windows\SysWOW64\jolinosk.exe 677ee056ff39ca2c093446c35e198113.exe File opened for modification C:\Windows\SysWOW64\jolinosk.exe 677ee056ff39ca2c093446c35e198113.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 880 wrote to memory of 3028 880 677ee056ff39ca2c093446c35e198113.exe 28 PID 880 wrote to memory of 3028 880 677ee056ff39ca2c093446c35e198113.exe 28 PID 880 wrote to memory of 3028 880 677ee056ff39ca2c093446c35e198113.exe 28 PID 880 wrote to memory of 3028 880 677ee056ff39ca2c093446c35e198113.exe 28 PID 880 wrote to memory of 2880 880 677ee056ff39ca2c093446c35e198113.exe 29 PID 880 wrote to memory of 2880 880 677ee056ff39ca2c093446c35e198113.exe 29 PID 880 wrote to memory of 2880 880 677ee056ff39ca2c093446c35e198113.exe 29 PID 880 wrote to memory of 2880 880 677ee056ff39ca2c093446c35e198113.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\677ee056ff39ca2c093446c35e198113.exe"C:\Users\Admin\AppData\Local\Temp\677ee056ff39ca2c093446c35e198113.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\jolinosk.exeC:\Windows\system32\jolinosk.exe ˜‰2⤵
- Executes dropped EXE
PID:3028
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\677ee056ff39ca2c093446c35e198113.exe.bat2⤵
- Deletes itself
PID:2880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD53070db7e580bda550eb0e4d32a357eb8
SHA1a3090d366843825f59d4865cbe6cc080c8a27e21
SHA256fbb09a627b8a7b8e76f6afd8beb7d324be75f1120b2931ab36bf287819b7cd2e
SHA512edad8154ed53ae7697aea6b7d122bc508d5fc9efdb2a4b049fc89e23be71fb84c833d558854d92b9e20090d90f4d4d394073091c84b51254a8d30fbd53a1b876
-
Filesize
11KB
MD5677ee056ff39ca2c093446c35e198113
SHA189059ebcac5d3b18a0cd001742294c628057b393
SHA25693b3b878974283e468af8f857d7730587bcb6a5a366a705bea77a3781e315956
SHA512b0d627c1e68cbad96dd1098c761115750fc7714d6972f72db5b167470e3b5e0835641dadf12ecf5a0e1b254d9a65180d4794593ea08b76080610bd499083e8b5