Overview
overview
7Static
static
38f3e301e7b...cb.exe
windows7-x64
78f3e301e7b...cb.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...og.dll
windows7-x64
3$PLUGINSDI...og.dll
windows10-2004-x64
3EasyOn__EO79.exe
windows7-x64
7EasyOn__EO79.exe
windows10-2004-x64
7$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3WSLfilejo.exe
windows7-x64
1WSLfilejo.exe
windows10-2004-x64
1Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 13:15
Static task
static1
Behavioral task
behavioral1
Sample
8f3e301e7ba49f7a7184a7f931b65fcb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8f3e301e7ba49f7a7184a7f931b65fcb.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/PassDialog.dll
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/PassDialog.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
EasyOn__EO79.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
EasyOn__EO79.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
WSLfilejo.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
WSLfilejo.exe
Resource
win10v2004-20231215-en
General
-
Target
WSLfilejo.exe
-
Size
855KB
-
MD5
a39fb0a630fa969169dcb86893977dde
-
SHA1
5c12be70e5c099d4c9db5b980c98ee70686bbbfb
-
SHA256
9080111dda29e1a7671f3db5d33f572637f8c8a3733c758e3f9a14e8c14156de
-
SHA512
1ecfc8da23a756b85661909425d6c35e8c69fca1a608214aa63f6c5df45bf52d919366e359cafabc878cf4356d0cb112f75fc1c326e00d65425676f72fe507d8
-
SSDEEP
12288:ARJ3QwI78m2RCzlVNRZYW5HJfN3uxWmQ9QRL1dF2Ahcsd57:aQh8m2RCzlVN51JfNexWmQ9CZDSu7
Malware Config
Signatures
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2428 WSLfilejo.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2428 WSLfilejo.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2428 wrote to memory of 1704 2428 WSLfilejo.exe 16 PID 2428 wrote to memory of 1704 2428 WSLfilejo.exe 16 PID 2428 wrote to memory of 1704 2428 WSLfilejo.exe 16 PID 2428 wrote to memory of 1704 2428 WSLfilejo.exe 16 PID 1704 wrote to memory of 2664 1704 cmd.exe 19 PID 1704 wrote to memory of 2664 1704 cmd.exe 19 PID 1704 wrote to memory of 2664 1704 cmd.exe 19 PID 1704 wrote to memory of 2664 1704 cmd.exe 19 PID 2428 wrote to memory of 2388 2428 WSLfilejo.exe 25 PID 2428 wrote to memory of 2388 2428 WSLfilejo.exe 25 PID 2428 wrote to memory of 2388 2428 WSLfilejo.exe 25 PID 2428 wrote to memory of 2388 2428 WSLfilejo.exe 25 PID 2388 wrote to memory of 2760 2388 cmd.exe 23 PID 2388 wrote to memory of 2760 2388 cmd.exe 23 PID 2388 wrote to memory of 2760 2388 cmd.exe 23 PID 2388 wrote to memory of 2760 2388 cmd.exe 23
Processes
-
C:\Users\Admin\AppData\Local\Temp\WSLfilejo.exe"C:\Users\Admin\AppData\Local\Temp\WSLfilejo.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\cmd.execmd.exe /C C:\Windows\system32\schtasks.exe /query /fo list2⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\schtasks.exeC:\Windows\system32\schtasks.exe /query /fo list3⤵PID:2664
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C C:\Windows\system32\schtasks.exe /query /fo list2⤵
- Suspicious use of WriteProcessMemory
PID:2388
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\system32\schtasks.exe /query /fo list1⤵PID:2760