Analysis
-
max time kernel
156s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24-02-2024 06:19
Behavioral task
behavioral1
Sample
a128a7ab31a41859c5a9e85868d4174f.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a128a7ab31a41859c5a9e85868d4174f.exe
Resource
win10v2004-20240221-en
General
-
Target
a128a7ab31a41859c5a9e85868d4174f.exe
-
Size
974KB
-
MD5
a128a7ab31a41859c5a9e85868d4174f
-
SHA1
7d614c5f27d5bd60af17e023b68fb67f787c461d
-
SHA256
8bcf3984e139a272179407ef7f22e912d9e686d59db6dd92b36d1a546e73a34d
-
SHA512
202464ce77f88b6a8878dd63acf1ed92267179a9f1d75f747b20f12abae0acb7373d56d5f37b1c54613e662600b8c842b77fdc5a032431b2119a41f5554c774e
-
SSDEEP
24576:W9ai9wwr6RyuZ44G/MfR1FTNkdBAnlXG6+Z1mbXhmQW:xmr6RyuZNGUfRFkUlXF+Z1IXW
Malware Config
Signatures
-
Nirsoft 2 IoCs
resource yara_rule behavioral2/memory/400-7-0x0000000000400000-0x000000000045B000-memory.dmp Nirsoft behavioral2/memory/2996-18-0x0000000000400000-0x0000000000422000-memory.dmp Nirsoft -
Executes dropped EXE 2 IoCs
pid Process 400 jfiag3g_gg.exe 2996 jfiag3g_gg.exe -
resource yara_rule behavioral2/files/0x00080000000230fa-3.dat upx behavioral2/memory/400-5-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/400-7-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/files/0x00090000000230fa-11.dat upx behavioral2/memory/2996-12-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/2996-18-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.exe" a128a7ab31a41859c5a9e85868d4174f.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 12 ip-api.com -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2996 jfiag3g_gg.exe 2996 jfiag3g_gg.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4008 wrote to memory of 400 4008 a128a7ab31a41859c5a9e85868d4174f.exe 86 PID 4008 wrote to memory of 400 4008 a128a7ab31a41859c5a9e85868d4174f.exe 86 PID 4008 wrote to memory of 400 4008 a128a7ab31a41859c5a9e85868d4174f.exe 86 PID 4008 wrote to memory of 2996 4008 a128a7ab31a41859c5a9e85868d4174f.exe 87 PID 4008 wrote to memory of 2996 4008 a128a7ab31a41859c5a9e85868d4174f.exe 87 PID 4008 wrote to memory of 2996 4008 a128a7ab31a41859c5a9e85868d4174f.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\a128a7ab31a41859c5a9e85868d4174f.exe"C:\Users\Admin\AppData\Local\Temp\a128a7ab31a41859c5a9e85868d4174f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵
- Executes dropped EXE
PID:400
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31B
MD5b7161c0845a64ff6d7345b67ff97f3b0
SHA1d223f855da541fe8e4c1d5c50cb26da0a1deb5fc
SHA256fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66
SHA51298d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680
-
Filesize
1KB
MD5ecc39ba30c7dc55213d4a8c5b32efc2a
SHA1f9f949d431e2f691ab289f55eb7b0e6f3d8e7280
SHA25602416088748abe86b4aa69d71d4e7ff50ac8ab76635eb41660ec3d7468e2e4b5
SHA5129ba539bfc7b7fe1743537efcfc7fde3cdf83e0280fd4f0ea9e681c8db7c72f7904964b4608dbec65920b381e64588b5c44dd0321809e773fe35b9cb35f98b270
-
Filesize
184KB
MD57fee8223d6e4f82d6cd115a28f0b6d58
SHA11b89c25f25253df23426bd9ff6c9208f1202f58b
SHA256a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59
SHA5123ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4
-
Filesize
61KB
MD5a6279ec92ff948760ce53bba817d6a77
SHA15345505e12f9e4c6d569a226d50e71b5a572dce2
SHA2568b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181
SHA512213cb374f1273c899e0c88a20c0101a7c28024ce5046a2e0d7898bd182d918288bb80367fea4454c437c057ff9ed4fffd42be48a13ca73653021a6d63e1cfa9c