Analysis
-
max time kernel
151s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
27/01/2024, 21:31
Behavioral task
behavioral1
Sample
7b53c0fd96dbb2f5ca9ec46c42921585.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7b53c0fd96dbb2f5ca9ec46c42921585.exe
Resource
win10v2004-20231215-en
General
-
Target
7b53c0fd96dbb2f5ca9ec46c42921585.exe
-
Size
11KB
-
MD5
7b53c0fd96dbb2f5ca9ec46c42921585
-
SHA1
b1313e6576795c78a5dd4695c17426bbdd75f14e
-
SHA256
368711a2837d1ec238b881f9c94aa8fcc93a8229d78f3541d563310b79b1e333
-
SHA512
c1e87ec66af8dbfff8c8263fc952e8eaae20d45db37e05f7cdd9363966d5f42a0f863c408986cb2127609d2223b786d4bff0a6ddeb85ea4abaaf1cde6b7024f8
-
SSDEEP
192:OLlXm0xffvqKPRhtJIIfh+TLNsqDWo/Ib1lnwPzGE4Zwhc9dMfbbmg:OpXm45POmh+vygWoEObYkiGfug
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Deletes itself 1 IoCs
pid Process 2764 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2256 jolinosk.exe -
Loads dropped DLL 2 IoCs
pid Process 2760 7b53c0fd96dbb2f5ca9ec46c42921585.exe 2760 7b53c0fd96dbb2f5ca9ec46c42921585.exe -
resource yara_rule behavioral1/memory/2760-0-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/files/0x002f000000015cdd-3.dat upx behavioral1/memory/2760-9-0x0000000000230000-0x000000000023E000-memory.dmp upx behavioral1/memory/2256-11-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2760-12-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\jolinos.dll 7b53c0fd96dbb2f5ca9ec46c42921585.exe File created C:\Windows\SysWOW64\jolinosk.exe 7b53c0fd96dbb2f5ca9ec46c42921585.exe File opened for modification C:\Windows\SysWOW64\jolinosk.exe 7b53c0fd96dbb2f5ca9ec46c42921585.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2760 wrote to memory of 2256 2760 7b53c0fd96dbb2f5ca9ec46c42921585.exe 28 PID 2760 wrote to memory of 2256 2760 7b53c0fd96dbb2f5ca9ec46c42921585.exe 28 PID 2760 wrote to memory of 2256 2760 7b53c0fd96dbb2f5ca9ec46c42921585.exe 28 PID 2760 wrote to memory of 2256 2760 7b53c0fd96dbb2f5ca9ec46c42921585.exe 28 PID 2760 wrote to memory of 2764 2760 7b53c0fd96dbb2f5ca9ec46c42921585.exe 29 PID 2760 wrote to memory of 2764 2760 7b53c0fd96dbb2f5ca9ec46c42921585.exe 29 PID 2760 wrote to memory of 2764 2760 7b53c0fd96dbb2f5ca9ec46c42921585.exe 29 PID 2760 wrote to memory of 2764 2760 7b53c0fd96dbb2f5ca9ec46c42921585.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b53c0fd96dbb2f5ca9ec46c42921585.exe"C:\Users\Admin\AppData\Local\Temp\7b53c0fd96dbb2f5ca9ec46c42921585.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\jolinosk.exeC:\Windows\system32\jolinosk.exe ˜‰2⤵
- Executes dropped EXE
PID:2256
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\7b53c0fd96dbb2f5ca9ec46c42921585.exe.bat2⤵
- Deletes itself
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD57751b8671fad0ce780608a0ad998e8d6
SHA1793f13934873ab877fc29c27b475b696f9528f5a
SHA2569aaac9016168127999588abc68ec29947cb75c29156dfeee1d8afb078acaf31c
SHA512ff462c515ad26abf92aa17009a77d3099d43e97e5d5f6307bf1a5063d714cf213ad1f2bf157e09b6a8fc49a8ccf5c5af820f7814562763d7d9e55a0c95f33001
-
Filesize
11KB
MD57b53c0fd96dbb2f5ca9ec46c42921585
SHA1b1313e6576795c78a5dd4695c17426bbdd75f14e
SHA256368711a2837d1ec238b881f9c94aa8fcc93a8229d78f3541d563310b79b1e333
SHA512c1e87ec66af8dbfff8c8263fc952e8eaae20d45db37e05f7cdd9363966d5f42a0f863c408986cb2127609d2223b786d4bff0a6ddeb85ea4abaaf1cde6b7024f8