Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-02-2024 05:16
Behavioral task
behavioral1
Sample
a84dbdb10d158b76edaafe7020925562.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a84dbdb10d158b76edaafe7020925562.exe
Resource
win10v2004-20240226-en
General
-
Target
a84dbdb10d158b76edaafe7020925562.exe
-
Size
373KB
-
MD5
a84dbdb10d158b76edaafe7020925562
-
SHA1
ef8b764c74b008d4d4d3b13d687d149346bbac4c
-
SHA256
67c120af3c7f5313ee2c250077edc0b84da2c7e708efcdffbfc0941bb9b9361c
-
SHA512
cd7c0ccda30d1b645502c57e0f64fe0a8b08727650de1c61bd66504fffd0713815eac3b0114dc30d3d64ff0d8a3be8af0fefc9ac0875f2189964851491c5cc77
-
SSDEEP
6144:qHjB/+bC0n/m31/2jJEUUsNEEZKOIf62QGNnnOTqGQCJX14j4i+pfl0:mR+bC0nOF/2jyUQEZK1RQGNnSYoX11pd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
jitok.exepid process 2988 jitok.exe -
Loads dropped DLL 2 IoCs
Processes:
a84dbdb10d158b76edaafe7020925562.exepid process 2932 a84dbdb10d158b76edaafe7020925562.exe 2932 a84dbdb10d158b76edaafe7020925562.exe -
Processes:
resource yara_rule behavioral1/memory/2932-0-0x0000000000400000-0x0000000000537000-memory.dmp upx \Users\Admin\AppData\Roaming\Hyyk\jitok.exe upx behavioral1/memory/2988-15-0x0000000000400000-0x0000000000537000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
jitok.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\{E97AF648-8469-AD4E-B6B3-012D8E7B2230} = "C:\\Users\\Admin\\AppData\\Roaming\\Hyyk\\jitok.exe" jitok.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
a84dbdb10d158b76edaafe7020925562.exedescription pid process target process PID 2932 set thread context of 2704 2932 a84dbdb10d158b76edaafe7020925562.exe cmd.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1028 2704 WerFault.exe cmd.exe 2884 1028 WerFault.exe WerFault.exe -
Processes:
a84dbdb10d158b76edaafe7020925562.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" a84dbdb10d158b76edaafe7020925562.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Privacy a84dbdb10d158b76edaafe7020925562.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
Processes:
jitok.exepid process 2988 jitok.exe 2988 jitok.exe 2988 jitok.exe 2988 jitok.exe 2988 jitok.exe 2988 jitok.exe 2988 jitok.exe 2988 jitok.exe 2988 jitok.exe 2988 jitok.exe 2988 jitok.exe 2988 jitok.exe 2988 jitok.exe 2988 jitok.exe 2988 jitok.exe 2988 jitok.exe 2988 jitok.exe 2988 jitok.exe 2988 jitok.exe 2988 jitok.exe 2988 jitok.exe 2988 jitok.exe 2988 jitok.exe 2988 jitok.exe 2988 jitok.exe 2988 jitok.exe 2988 jitok.exe 2988 jitok.exe 2988 jitok.exe 2988 jitok.exe 2988 jitok.exe 2988 jitok.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
a84dbdb10d158b76edaafe7020925562.exedescription pid process Token: SeSecurityPrivilege 2932 a84dbdb10d158b76edaafe7020925562.exe Token: SeSecurityPrivilege 2932 a84dbdb10d158b76edaafe7020925562.exe Token: SeSecurityPrivilege 2932 a84dbdb10d158b76edaafe7020925562.exe -
Suspicious use of WriteProcessMemory 56 IoCs
Processes:
a84dbdb10d158b76edaafe7020925562.exejitok.execmd.exeWerFault.exedescription pid process target process PID 2932 wrote to memory of 2988 2932 a84dbdb10d158b76edaafe7020925562.exe jitok.exe PID 2932 wrote to memory of 2988 2932 a84dbdb10d158b76edaafe7020925562.exe jitok.exe PID 2932 wrote to memory of 2988 2932 a84dbdb10d158b76edaafe7020925562.exe jitok.exe PID 2932 wrote to memory of 2988 2932 a84dbdb10d158b76edaafe7020925562.exe jitok.exe PID 2988 wrote to memory of 1120 2988 jitok.exe taskhost.exe PID 2988 wrote to memory of 1120 2988 jitok.exe taskhost.exe PID 2988 wrote to memory of 1120 2988 jitok.exe taskhost.exe PID 2988 wrote to memory of 1120 2988 jitok.exe taskhost.exe PID 2988 wrote to memory of 1120 2988 jitok.exe taskhost.exe PID 2988 wrote to memory of 1172 2988 jitok.exe Dwm.exe PID 2988 wrote to memory of 1172 2988 jitok.exe Dwm.exe PID 2988 wrote to memory of 1172 2988 jitok.exe Dwm.exe PID 2988 wrote to memory of 1172 2988 jitok.exe Dwm.exe PID 2988 wrote to memory of 1172 2988 jitok.exe Dwm.exe PID 2988 wrote to memory of 1212 2988 jitok.exe Explorer.EXE PID 2988 wrote to memory of 1212 2988 jitok.exe Explorer.EXE PID 2988 wrote to memory of 1212 2988 jitok.exe Explorer.EXE PID 2988 wrote to memory of 1212 2988 jitok.exe Explorer.EXE PID 2988 wrote to memory of 1212 2988 jitok.exe Explorer.EXE PID 2988 wrote to memory of 320 2988 jitok.exe DllHost.exe PID 2988 wrote to memory of 320 2988 jitok.exe DllHost.exe PID 2988 wrote to memory of 320 2988 jitok.exe DllHost.exe PID 2988 wrote to memory of 320 2988 jitok.exe DllHost.exe PID 2988 wrote to memory of 320 2988 jitok.exe DllHost.exe PID 2988 wrote to memory of 2932 2988 jitok.exe a84dbdb10d158b76edaafe7020925562.exe PID 2988 wrote to memory of 2932 2988 jitok.exe a84dbdb10d158b76edaafe7020925562.exe PID 2988 wrote to memory of 2932 2988 jitok.exe a84dbdb10d158b76edaafe7020925562.exe PID 2988 wrote to memory of 2932 2988 jitok.exe a84dbdb10d158b76edaafe7020925562.exe PID 2988 wrote to memory of 2932 2988 jitok.exe a84dbdb10d158b76edaafe7020925562.exe PID 2932 wrote to memory of 2704 2932 a84dbdb10d158b76edaafe7020925562.exe cmd.exe PID 2932 wrote to memory of 2704 2932 a84dbdb10d158b76edaafe7020925562.exe cmd.exe PID 2932 wrote to memory of 2704 2932 a84dbdb10d158b76edaafe7020925562.exe cmd.exe PID 2932 wrote to memory of 2704 2932 a84dbdb10d158b76edaafe7020925562.exe cmd.exe PID 2932 wrote to memory of 2704 2932 a84dbdb10d158b76edaafe7020925562.exe cmd.exe PID 2932 wrote to memory of 2704 2932 a84dbdb10d158b76edaafe7020925562.exe cmd.exe PID 2932 wrote to memory of 2704 2932 a84dbdb10d158b76edaafe7020925562.exe cmd.exe PID 2932 wrote to memory of 2704 2932 a84dbdb10d158b76edaafe7020925562.exe cmd.exe PID 2932 wrote to memory of 2704 2932 a84dbdb10d158b76edaafe7020925562.exe cmd.exe PID 2704 wrote to memory of 1028 2704 cmd.exe WerFault.exe PID 2704 wrote to memory of 1028 2704 cmd.exe WerFault.exe PID 2704 wrote to memory of 1028 2704 cmd.exe WerFault.exe PID 2704 wrote to memory of 1028 2704 cmd.exe WerFault.exe PID 2988 wrote to memory of 2804 2988 jitok.exe conhost.exe PID 2988 wrote to memory of 2804 2988 jitok.exe conhost.exe PID 2988 wrote to memory of 2804 2988 jitok.exe conhost.exe PID 2988 wrote to memory of 2804 2988 jitok.exe conhost.exe PID 2988 wrote to memory of 2804 2988 jitok.exe conhost.exe PID 2988 wrote to memory of 1028 2988 jitok.exe WerFault.exe PID 2988 wrote to memory of 1028 2988 jitok.exe WerFault.exe PID 2988 wrote to memory of 1028 2988 jitok.exe WerFault.exe PID 2988 wrote to memory of 1028 2988 jitok.exe WerFault.exe PID 2988 wrote to memory of 1028 2988 jitok.exe WerFault.exe PID 1028 wrote to memory of 2884 1028 WerFault.exe WerFault.exe PID 1028 wrote to memory of 2884 1028 WerFault.exe WerFault.exe PID 1028 wrote to memory of 2884 1028 WerFault.exe WerFault.exe PID 1028 wrote to memory of 2884 1028 WerFault.exe WerFault.exe
Processes
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\a84dbdb10d158b76edaafe7020925562.exe"C:\Users\Admin\AppData\Local\Temp\a84dbdb10d158b76edaafe7020925562.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Hyyk\jitok.exe"C:\Users\Admin\AppData\Roaming\Hyyk\jitok.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp1e2356b6.bat"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 1124⤵
- Program crash
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1028 -s 5285⤵
- Program crash
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-181336726890199196346993063320036088751165019595-209369799-1715889996-1778760264"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Ovjyv\uqax.gutFilesize
366B
MD543f241e27de49a4c05f0756a5ac8eca7
SHA1cfa55d256d0a9ca79dfdfb576b62cb7b3ea44018
SHA2564d28aec225e7cecb8fbbe442a1fca9117bb117b4f7c791df7858b4c48391db5b
SHA512be92eb9959d412a694e29e0626caef51dae885e23520482c0dcea9af04950765e7fbe8a15f73b99e98f05184810dc6e7594793be5e20ba3c4c977cb86eab3369
-
\Users\Admin\AppData\Roaming\Hyyk\jitok.exeFilesize
373KB
MD53c50f7177e8b16eba299c25045fdae9d
SHA1bd4e59d24dff6eae48fba614ccfcc3a020765fb0
SHA256693a3495b3007a8e9d7b20cee0de4b6f92c7e82b95b03869502de4c960a30170
SHA51237b742cbb503f85dbb26d03a9391e1587cb9fd0b5df7e6803152299c16466e3c492d4eb663f370e6b853ee939c786abab08623da97640f6b1c4269163c7e78c3
-
memory/320-43-0x0000000000260000-0x00000000002A1000-memory.dmpFilesize
260KB
-
memory/320-49-0x0000000000260000-0x00000000002A1000-memory.dmpFilesize
260KB
-
memory/320-45-0x0000000000260000-0x00000000002A1000-memory.dmpFilesize
260KB
-
memory/320-47-0x0000000000260000-0x00000000002A1000-memory.dmpFilesize
260KB
-
memory/1120-25-0x0000000002060000-0x00000000020A1000-memory.dmpFilesize
260KB
-
memory/1120-16-0x0000000002060000-0x00000000020A1000-memory.dmpFilesize
260KB
-
memory/1120-19-0x0000000002060000-0x00000000020A1000-memory.dmpFilesize
260KB
-
memory/1120-21-0x0000000002060000-0x00000000020A1000-memory.dmpFilesize
260KB
-
memory/1120-23-0x0000000002060000-0x00000000020A1000-memory.dmpFilesize
260KB
-
memory/1172-29-0x00000000001B0000-0x00000000001F1000-memory.dmpFilesize
260KB
-
memory/1172-31-0x00000000001B0000-0x00000000001F1000-memory.dmpFilesize
260KB
-
memory/1172-35-0x00000000001B0000-0x00000000001F1000-memory.dmpFilesize
260KB
-
memory/1172-33-0x00000000001B0000-0x00000000001F1000-memory.dmpFilesize
260KB
-
memory/1212-40-0x0000000002D40000-0x0000000002D81000-memory.dmpFilesize
260KB
-
memory/1212-41-0x0000000002D40000-0x0000000002D81000-memory.dmpFilesize
260KB
-
memory/1212-38-0x0000000002D40000-0x0000000002D81000-memory.dmpFilesize
260KB
-
memory/1212-39-0x0000000002D40000-0x0000000002D81000-memory.dmpFilesize
260KB
-
memory/2932-57-0x0000000000390000-0x0000000000391000-memory.dmpFilesize
4KB
-
memory/2932-77-0x0000000000390000-0x0000000000391000-memory.dmpFilesize
4KB
-
memory/2932-171-0x0000000000300000-0x0000000000341000-memory.dmpFilesize
260KB
-
memory/2932-12-0x0000000002480000-0x00000000025B7000-memory.dmpFilesize
1.2MB
-
memory/2932-1-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2932-3-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2932-56-0x0000000000300000-0x0000000000341000-memory.dmpFilesize
260KB
-
memory/2932-55-0x0000000000300000-0x0000000000341000-memory.dmpFilesize
260KB
-
memory/2932-170-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2932-54-0x0000000000300000-0x0000000000341000-memory.dmpFilesize
260KB
-
memory/2932-53-0x0000000000300000-0x0000000000341000-memory.dmpFilesize
260KB
-
memory/2932-60-0x0000000000300000-0x0000000000341000-memory.dmpFilesize
260KB
-
memory/2932-62-0x0000000077A30000-0x0000000077A31000-memory.dmpFilesize
4KB
-
memory/2932-59-0x0000000000390000-0x0000000000391000-memory.dmpFilesize
4KB
-
memory/2932-52-0x0000000000300000-0x0000000000341000-memory.dmpFilesize
260KB
-
memory/2932-63-0x0000000000390000-0x0000000000391000-memory.dmpFilesize
4KB
-
memory/2932-65-0x0000000000390000-0x0000000000391000-memory.dmpFilesize
4KB
-
memory/2932-67-0x0000000000390000-0x0000000000391000-memory.dmpFilesize
4KB
-
memory/2932-69-0x0000000000390000-0x0000000000391000-memory.dmpFilesize
4KB
-
memory/2932-71-0x0000000000390000-0x0000000000391000-memory.dmpFilesize
4KB
-
memory/2932-73-0x0000000000390000-0x0000000000391000-memory.dmpFilesize
4KB
-
memory/2932-75-0x0000000000390000-0x0000000000391000-memory.dmpFilesize
4KB
-
memory/2932-0-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2932-79-0x0000000000390000-0x0000000000391000-memory.dmpFilesize
4KB
-
memory/2932-81-0x0000000000390000-0x0000000000391000-memory.dmpFilesize
4KB
-
memory/2932-153-0x0000000000390000-0x0000000000391000-memory.dmpFilesize
4KB
-
memory/2932-2-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/2988-17-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2988-15-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2988-189-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2988-190-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB