Analysis

  • max time kernel
    150s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/02/2024, 08:26

General

  • Target

    SecuriteInfo.com.W32.Trojan.JLXB-0978.13139.31935.exe

  • Size

    717KB

  • MD5

    43b5145b5ddce4a256b91b68c0b2add1

  • SHA1

    9727925e102221c103c00b7dae6f868e53e92aae

  • SHA256

    5aa98d459d5cf1a14102e110edeeac849172bf7f0da7afc38e778201332db7a4

  • SHA512

    75063589ab570b5d28014de9eb8c6b00e0101709ed5d53bbae5019afd0e73b1936f2baf3eda386df4769ee99a8f36189f9b5bad29daccca4771cea9b7e59dbb8

  • SSDEEP

    12288:M1f8uiEWyovxISvjAAr9w1000100001ZqOV8Ww/uQRqekzTIHNafnAr9w100010L:Mx8uiEWdeSvBX8JqekzTUNa8/0

Score
6/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Mark of the Web detected: This indicates that the page was originally saved or cloned. 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.Trojan.JLXB-0978.13139.31935.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.Trojan.JLXB-0978.13139.31935.exe"
    1⤵
    • Checks computer location settings
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:3336
    • C:\Users\Admin\AppData\Local\YTS\SJPT\MANAGER\SJPTMANAGERLauncher.exe
      "C:\Users\Admin\AppData\Local\YTS\SJPT\MANAGER\SJPTMANAGERLauncher.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3440

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_75C7D3AC9C1C329B3ACDBD5E1DDEC854

          Filesize

          727B

          MD5

          ce8f19568e567c7d1638b2e13919743a

          SHA1

          026c8db3a3691edbc6dddb12ccbe0aa2c6082a14

          SHA256

          4bb8c2ac508e76e976c3459563786838db3c94838db8cf544cf5850734de6811

          SHA512

          740f3ea1c8af4ec1ed3c5d27a25fa774198cea10abaaf73a1feeaab1fe06d6e30c3f3e10a4fd5ecccf382ab6a6153017809c1db13f362430ff69f62d3acce487

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

          Filesize

          727B

          MD5

          d680627aad7bb2c4ffc514ce0b5043a1

          SHA1

          72669cbc6e841df5a3df2014c42e12bb21b61f60

          SHA256

          d31f1c5bc4c86d6e2be19b31ccf51454545c7e05c9f00b5f561d428a891acab6

          SHA512

          87e1da92b2b5c009959bcc19570891411aadeae94ee1a967990961d6fbc306f9e8205e39669eb5213145c538e857d7a96a79268ff320c48b51dce11b1ece10a2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_75C7D3AC9C1C329B3ACDBD5E1DDEC854

          Filesize

          404B

          MD5

          eeefb191e42bfcb8f6353474e402f0ed

          SHA1

          bac12596d30228eb86013eee734a7593a9344cd7

          SHA256

          8ae36a7c2b4e5ef481e040a16adfb84f583ba08d6505eb2443ceb3ab93000683

          SHA512

          7cf41aedfb8f3b21092c14bc85be15a23776eff6db1f865a2f4f97884217be33e48f822f23de7e9859df6c920cf7505ca5a8076cf47c532f23d132698390a0ef

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

          Filesize

          412B

          MD5

          671cbd0fd0ae592b0aecb765c9a370a9

          SHA1

          63748d4796b85e2e0e689c6636d66fd5c460b4ab

          SHA256

          a4b701698ecc15ad3d3a962df718346f52918c830a4bad2dc33890dfef991b70

          SHA512

          1a8692a6c0b862d4c739681c7933f2f638d273077a92da62dcbc0277c75f87ff04349d638fd68bbb3d99072a0d88792db9114258769acf697fd6f55381c8d454

        • C:\Users\Admin\AppData\Local\YTS\SJPT\MANAGER\SJPTMANAGER.ini

          Filesize

          52B

          MD5

          6dbdfa0be649c4c04e1d5abf7fb944b0

          SHA1

          1b4f46568a6a7b75ab23e0580fc44b319b64a1da

          SHA256

          a0cee02070166baebed17a30f110d239210c7ba9594c943821c4b25a94737aee

          SHA512

          61100258b4dfa212ef3fadf9b360b83caf658525ba04afdad5222352e39798837cceabbd6ec6ee57f023d4d38c1dbfe491482ccc1f2565f0dd8ad31ee8a3ae03

        • C:\Users\Admin\AppData\Local\YTS\SJPT\MANAGER\SJPTMANAGERLauncher.exe

          Filesize

          717KB

          MD5

          43b5145b5ddce4a256b91b68c0b2add1

          SHA1

          9727925e102221c103c00b7dae6f868e53e92aae

          SHA256

          5aa98d459d5cf1a14102e110edeeac849172bf7f0da7afc38e778201332db7a4

          SHA512

          75063589ab570b5d28014de9eb8c6b00e0101709ed5d53bbae5019afd0e73b1936f2baf3eda386df4769ee99a8f36189f9b5bad29daccca4771cea9b7e59dbb8

        • memory/3336-26-0x0000000074E70000-0x0000000075421000-memory.dmp

          Filesize

          5.7MB

        • memory/3336-0-0x0000000074E70000-0x0000000075421000-memory.dmp

          Filesize

          5.7MB

        • memory/3336-2-0x0000000000F30000-0x0000000000F40000-memory.dmp

          Filesize

          64KB

        • memory/3336-1-0x0000000074E70000-0x0000000075421000-memory.dmp

          Filesize

          5.7MB

        • memory/3440-27-0x0000000074DE0000-0x0000000075391000-memory.dmp

          Filesize

          5.7MB

        • memory/3440-28-0x00000000028B0000-0x00000000028C0000-memory.dmp

          Filesize

          64KB

        • memory/3440-34-0x0000000074DE0000-0x0000000075391000-memory.dmp

          Filesize

          5.7MB

        • memory/3440-37-0x00000000028B0000-0x00000000028C0000-memory.dmp

          Filesize

          64KB

        • memory/3440-40-0x00000000028B0000-0x00000000028C0000-memory.dmp

          Filesize

          64KB

        • memory/3440-41-0x0000000074DE0000-0x0000000075391000-memory.dmp

          Filesize

          5.7MB

        • memory/3440-42-0x00000000028B0000-0x00000000028C0000-memory.dmp

          Filesize

          64KB

        • memory/3440-43-0x00000000028B0000-0x00000000028C0000-memory.dmp

          Filesize

          64KB

        • memory/3440-44-0x00000000028B0000-0x00000000028C0000-memory.dmp

          Filesize

          64KB