Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 16:08
Static task
static1
Behavioral task
behavioral1
Sample
bc3ba0fe12e69a0895b056bd8afa831a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bc3ba0fe12e69a0895b056bd8afa831a.exe
Resource
win10v2004-20240226-en
General
-
Target
bc3ba0fe12e69a0895b056bd8afa831a.exe
-
Size
21.7MB
-
MD5
bc3ba0fe12e69a0895b056bd8afa831a
-
SHA1
1350ee1279d2eb4237dc03bf7df1eccd707772b5
-
SHA256
2eac4893ae5858307f11c3cd82f5f58e46766bb3a6b60020291e13fbf9871239
-
SHA512
c6b9d4dcb082d0c2de6543dec0dd304eae70a1d83ffc3c6b7efa21d2fb98ff7b11c2ec8b0cf614ea2596e2484089e9fa58176ba8f44f610a23ee65b9c26aab7d
-
SSDEEP
98304:EcKAAkAADAkAARKAAkAADAkARAkAADAkA3kAAWAADAkAARKAAk7kA3kAAWAADAkS:E9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2544 hjjav.exe -
Loads dropped DLL 2 IoCs
pid Process 2868 bc3ba0fe12e69a0895b056bd8afa831a.exe 2868 bc3ba0fe12e69a0895b056bd8afa831a.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main hjjav.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2544 hjjav.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2544 hjjav.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2544 hjjav.exe 2544 hjjav.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2544 2868 bc3ba0fe12e69a0895b056bd8afa831a.exe 28 PID 2868 wrote to memory of 2544 2868 bc3ba0fe12e69a0895b056bd8afa831a.exe 28 PID 2868 wrote to memory of 2544 2868 bc3ba0fe12e69a0895b056bd8afa831a.exe 28 PID 2868 wrote to memory of 2544 2868 bc3ba0fe12e69a0895b056bd8afa831a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc3ba0fe12e69a0895b056bd8afa831a.exe"C:\Users\Admin\AppData\Local\Temp\bc3ba0fe12e69a0895b056bd8afa831a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\hjjav.exeC:\Users\Admin\AppData\Local\Temp\hjjav.exe -run C:\Users\Admin\AppData\Local\Temp\bc3ba0fe12e69a0895b056bd8afa831a.exe2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15.3MB
MD5690ebcc2ccc27e0a92b3d8f3cdcc68c7
SHA19de74c39a5f0be1974564d951df18f22eb0f503d
SHA256ed704435f8103dd09d079f310575f12b24d7b338759be2a0a85ed9dc08c02288
SHA512eb784b02a6c52f100a27da1d4d77358e7a31a60f6149c627439311060d18e1b0d4d14bf384caf1e4ce060ed2b38825c20f20e5b717d85f8accb6c2492f851991
-
Filesize
11.4MB
MD58faf3df54acd2ab0d57c367bf46a93f7
SHA1260c954688a20f5d3cf5aaea66775d7c377eee31
SHA256db445a5cd53f24d91fb436b93d58057b2dbf718c13969a39321beb07d08598d5
SHA5121979d826de468cdfb7346f55efd37f00be51b9d11c6b10c9225ee7c749f0fa311c3b33c4031b80a079807b7747b7895de5f0d21ecbf532605374ee5090d2ccd3
-
Filesize
15.8MB
MD56e82c77ffddd41019b69b0422cb60496
SHA19c349b294e1ca48f9ac9b9bb560480a6c14dbf16
SHA2564ef585a0ea539d67c1b698302a8f7aec3fc703c214995fbff9613158c03487d8
SHA512918daf4eaa506552cbf27443f9d53485e5277124c3d6afe089d0ab78b83250bcee03569889d123097eb0c70a40388058f21a8c9dcac6f6d5dbbb19bb1dc45c3a
-
Filesize
11.5MB
MD5c6171e5c06a317fe892a057a32346c7d
SHA132bda60b279d0d74c81343fe3e3e4c72ff8b13d6
SHA2564d4d8db66471af8e88e70c20b670bda639d35272c84f424c6931657e7a9b5065
SHA512a8ea97acceda4106afd8ba18b1af853281b5a99e1a96dea8fd4460e5e7036c8ca83c32a88df1fc74ff8d91f8ac969dd01b063370ce8e041c492b5f8be50d3d61
-
Filesize
11.3MB
MD5e891e1f98d646d67911159ec932c452d
SHA1a1b91b15e63a8d6bff5172f6fca2480a83318659
SHA256e79183f07cab365588ee38c7704f49206c9c5701913447b693b15d8e8a9ff5d8
SHA51246b23ef5f730929f057b2c732a81364827258e1011db9496a874de1682c1d7687d5209d8114fd325a343fe853eab3971cf75c6e427163ecc494b56140142bd52