Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    08/03/2024, 16:06

General

  • Target

    bbaea7dbde076cc97a50befba4fb9909.exe

  • Size

    90KB

  • MD5

    bbaea7dbde076cc97a50befba4fb9909

  • SHA1

    ad879681bdbf9b286324f4851bd3b699e68a37f6

  • SHA256

    2939c242fd67c1057d531b6a6cf167653b06288b8acdcb99bb32f62e9825ccf4

  • SHA512

    abb5faa2d75667692edeb240dad2db7aa7fab260747f8204bfc2fd0c58ba12f040bc8024d0c528e2196542b771e7fe45c25b615316392da57154f316e6a4a608

  • SSDEEP

    1536:10b4datWrQaMmy1cydIq9ya9RD4piGN4CxVZZfy2IiwYb0hqCwVFH8WVGSpiliki:i3W8aO1cyeqhLcx4CxVHHIi/04TFc2pH

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies registry class 50 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bbaea7dbde076cc97a50befba4fb9909.exe
    "C:\Users\Admin\AppData\Local\Temp\bbaea7dbde076cc97a50befba4fb9909.exe"
    1⤵
    • Checks BIOS information in registry
    • Drops file in Program Files directory
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2404
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c rmdir /S /Q "C:\Program Files (x86)\JavaCore\"
      2⤵
        PID:500
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c rmdir /S /Q "C:\Program Files (x86)\Eroca\"
        2⤵
          PID:1712
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c rmdir /S /Q "C:\Program Files (x86)\mjc\"
          2⤵
            PID:2692
          • C:\Windows\SysWOW64\regsvr32.exe
            regsvr32.exe /s "C:\Program Files (x86)\Mjcore\Mjcore.dll"
            2⤵
            • Checks BIOS information in registry
            • Loads dropped DLL
            • Installs/modifies Browser Helper Object
            • Checks processor information in registry
            • Enumerates system info in registry
            • Modifies registry class
            PID:2064

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Mjcore\Mjcore.dll

          Filesize

          133KB

          MD5

          45577131ebe4de4ccbd731fe68f84160

          SHA1

          bb2812fffe83baed6060210299860cc49911c979

          SHA256

          343f335a972c431e8f6667e547d2b18b21505bacad36515a7cb64e32620127ec

          SHA512

          297a3d24d1820fbaa29a3a487d73dff942dfcb9e4118d0c8abe39da703a3391b0dfd8909af7961511520a92242c417bb7d3e58055563dacee3921203004deff7

        • memory/2404-0-0x0000000000400000-0x0000000000423000-memory.dmp

          Filesize

          140KB

        • memory/2404-9-0x0000000000400000-0x0000000000423000-memory.dmp

          Filesize

          140KB