Analysis
-
max time kernel
142s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12/03/2024, 11:52
Static task
static1
Behavioral task
behavioral1
Sample
c34b865cbb2c136117fdab715a11bf06.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c34b865cbb2c136117fdab715a11bf06.exe
Resource
win10v2004-20240226-en
General
-
Target
c34b865cbb2c136117fdab715a11bf06.exe
-
Size
4.7MB
-
MD5
c34b865cbb2c136117fdab715a11bf06
-
SHA1
0fac3144bef5a73327e19fdb150cb5881d6b16c6
-
SHA256
1757530797a21734327b5a5f519702d2bb3afa2f9890024b3cb1466b1e187e83
-
SHA512
9b73917231ab3522f0c0f71ccd2d89e3e3fd07ccbac2839f90b95492e897131c56757f05db80b68733a2cbf03112997c310abd16dd9481aae8a7d6c49dc28ea4
-
SSDEEP
49152:EQFRHrmQG+qsuQG+qs2suQG+qs++qsuQG+qs2r:EcKlLlFLlxLlFr
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2584 ljj.exe -
Loads dropped DLL 2 IoCs
pid Process 2888 c34b865cbb2c136117fdab715a11bf06.exe 2888 c34b865cbb2c136117fdab715a11bf06.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main ljj.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2584 ljj.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2584 ljj.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2584 ljj.exe 2584 ljj.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2584 2888 c34b865cbb2c136117fdab715a11bf06.exe 28 PID 2888 wrote to memory of 2584 2888 c34b865cbb2c136117fdab715a11bf06.exe 28 PID 2888 wrote to memory of 2584 2888 c34b865cbb2c136117fdab715a11bf06.exe 28 PID 2888 wrote to memory of 2584 2888 c34b865cbb2c136117fdab715a11bf06.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c34b865cbb2c136117fdab715a11bf06.exe"C:\Users\Admin\AppData\Local\Temp\c34b865cbb2c136117fdab715a11bf06.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\ljj.exeC:\Users\Admin\AppData\Local\Temp\ljj.exe -run C:\Users\Admin\AppData\Local\Temp\c34b865cbb2c136117fdab715a11bf06.exe2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
111KB
MD5f72b68fe3b811d196d338e50380b01fe
SHA1dcfee0b21555dac5743e7f89a22adff7e10823b5
SHA2563dd2065f6af28b4949b08a52bd5ac7c727cb3dd791931dfdb6694ce5dffd09d8
SHA512a5255207837361dc87bcc5e6698fe59e8c1c7b450c7c4b38bb3903a3fdc5715de7c5f02d6bf5e2030cfa2c5dc4c580f8fa54f8805f70b127f91f4496106eb39d
-
Filesize
963KB
MD5ffbfe2802ecd5e75bff26bd2891d77d7
SHA1ad962f4fbcdbae40f39237d0b7e9cad368a6bf63
SHA25645a5845034bf2d85865d113d40845a49ca6a208c4966598f2260ce19a3fd33e5
SHA512fde3802bb385e10d021373e02d664558af46779bbfe25c55ed3d17e64b428e75749db81db3c8906c8d88bfa4626aebf0708f64c8bce70cf7e3d4ae49629748b4
-
Filesize
983KB
MD577e1c7b3d792e259fe0f2d0253d72f79
SHA1e3ee8af290bbfd33eccfbfe09a64ae2cdd92df72
SHA2560d61792b22df4b35ea9a17c46a0d5d52e0a1b61752f95c04b7fa170c670166a8
SHA512476695363ece19e0c008fb6728fa79f9b3a40ef24a09c16ddd1c7bf341489db20697aca20706cbdab135cd48e75bb33fd65652dc10c9495043512605d27ece17
-
Filesize
1.5MB
MD53ab203a814b06ecf62a05a3ea5aa8a84
SHA1673b5f6edd18c729b5450508cb8ef46c9dbfd9ab
SHA2567cd8364ccfcc9f00356c9c7e04981b64ac357aaab270e82519c84e186db6ae5c
SHA5122ce8da50764ab007e6df1a35d71441795dbc11aca940b2a848f310194d5d460a1a7a2119014cd7a047e417e86700021b37123206263e6da8d441043741591030
-
Filesize
192KB
MD5e37c01f65f5a809f52f49309d8252e6f
SHA11e981bbd031ca3729576b4bfe102fc5404bbcb0e
SHA25695238a4a86669426a0f16e69634d9401ac62562604bcb7f7c385f58f4573e3d0
SHA5128bf746d5b192a2f8de487d1f87b31609292996fe62ccc8f97df8c4db8d59a1a4090b8f3de15fc4f7a0059662d026ec91f0f8eb6f06a500b727de8c21643aaa1a