Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
24-02-2024 06:19
Behavioral task
behavioral1
Sample
a128a7ab31a41859c5a9e85868d4174f.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a128a7ab31a41859c5a9e85868d4174f.exe
Resource
win10v2004-20240221-en
General
-
Target
a128a7ab31a41859c5a9e85868d4174f.exe
-
Size
974KB
-
MD5
a128a7ab31a41859c5a9e85868d4174f
-
SHA1
7d614c5f27d5bd60af17e023b68fb67f787c461d
-
SHA256
8bcf3984e139a272179407ef7f22e912d9e686d59db6dd92b36d1a546e73a34d
-
SHA512
202464ce77f88b6a8878dd63acf1ed92267179a9f1d75f747b20f12abae0acb7373d56d5f37b1c54613e662600b8c842b77fdc5a032431b2119a41f5554c774e
-
SSDEEP
24576:W9ai9wwr6RyuZ44G/MfR1FTNkdBAnlXG6+Z1mbXhmQW:xmr6RyuZNGUfRFkUlXF+Z1IXW
Malware Config
Signatures
-
Nirsoft 2 IoCs
resource yara_rule behavioral1/memory/1192-11-0x0000000000400000-0x000000000045B000-memory.dmp Nirsoft behavioral1/memory/2548-59-0x0000000000400000-0x0000000000422000-memory.dmp Nirsoft -
Executes dropped EXE 2 IoCs
pid Process 1192 jfiag3g_gg.exe 2548 jfiag3g_gg.exe -
Loads dropped DLL 4 IoCs
pid Process 1800 a128a7ab31a41859c5a9e85868d4174f.exe 1800 a128a7ab31a41859c5a9e85868d4174f.exe 1800 a128a7ab31a41859c5a9e85868d4174f.exe 1800 a128a7ab31a41859c5a9e85868d4174f.exe -
resource yara_rule behavioral1/files/0x000d000000014713-2.dat upx behavioral1/memory/1800-8-0x0000000000210000-0x000000000026B000-memory.dmp upx behavioral1/memory/1192-11-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/files/0x0012000000014713-50.dat upx behavioral1/memory/2548-59-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.exe" a128a7ab31a41859c5a9e85868d4174f.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1800 wrote to memory of 1192 1800 a128a7ab31a41859c5a9e85868d4174f.exe 28 PID 1800 wrote to memory of 1192 1800 a128a7ab31a41859c5a9e85868d4174f.exe 28 PID 1800 wrote to memory of 1192 1800 a128a7ab31a41859c5a9e85868d4174f.exe 28 PID 1800 wrote to memory of 1192 1800 a128a7ab31a41859c5a9e85868d4174f.exe 28 PID 1800 wrote to memory of 2548 1800 a128a7ab31a41859c5a9e85868d4174f.exe 29 PID 1800 wrote to memory of 2548 1800 a128a7ab31a41859c5a9e85868d4174f.exe 29 PID 1800 wrote to memory of 2548 1800 a128a7ab31a41859c5a9e85868d4174f.exe 29 PID 1800 wrote to memory of 2548 1800 a128a7ab31a41859c5a9e85868d4174f.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\a128a7ab31a41859c5a9e85868d4174f.exe"C:\Users\Admin\AppData\Local\Temp\a128a7ab31a41859c5a9e85868d4174f.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵
- Executes dropped EXE
PID:1192
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵
- Executes dropped EXE
PID:2548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
31B
MD5b7161c0845a64ff6d7345b67ff97f3b0
SHA1d223f855da541fe8e4c1d5c50cb26da0a1deb5fc
SHA256fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66
SHA51298d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680
-
Filesize
184KB
MD57fee8223d6e4f82d6cd115a28f0b6d58
SHA11b89c25f25253df23426bd9ff6c9208f1202f58b
SHA256a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59
SHA5123ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4
-
Filesize
61KB
MD5a6279ec92ff948760ce53bba817d6a77
SHA15345505e12f9e4c6d569a226d50e71b5a572dce2
SHA2568b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181
SHA512213cb374f1273c899e0c88a20c0101a7c28024ce5046a2e0d7898bd182d918288bb80367fea4454c437c057ff9ed4fffd42be48a13ca73653021a6d63e1cfa9c