Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/03/2024, 13:00
Static task
static1
Behavioral task
behavioral1
Sample
d62d8635dc16c516f51561c5a2d533f9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d62d8635dc16c516f51561c5a2d533f9.exe
Resource
win10v2004-20240226-en
General
-
Target
d62d8635dc16c516f51561c5a2d533f9.exe
-
Size
48KB
-
MD5
d62d8635dc16c516f51561c5a2d533f9
-
SHA1
ad536823ee9ecb7c121d6782fe11fe6b42925374
-
SHA256
a0081fb0791d0535db30af5e892918390c12cf0cad0b33276ea952878d31829e
-
SHA512
f11adb6c64f73fe1965f02689d09793c32b9d0ddb80ec3d9a69aa92f80cf26ef8a05b459a58bf9e0c50475e70d1dd130b63434a061bfdcbb10cd2752823fc359
-
SSDEEP
768:6buDiv3N+KjGgZCH6yku7oGeZsQT6rd/tjtP19DWsWqFUUEhJJMXLSi2uJ2uh:hiPMIGIdtCo0Ftpt3yZzJJoLS0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2648 juupdate.exe -
Loads dropped DLL 4 IoCs
pid Process 1968 d62d8635dc16c516f51561c5a2d533f9.exe 2648 juupdate.exe 2648 juupdate.exe 2648 juupdate.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\System32\taoy.i d62d8635dc16c516f51561c5a2d533f9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.kvh\ = "JSEFile" d62d8635dc16c516f51561c5a2d533f9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.kvh d62d8635dc16c516f51561c5a2d533f9.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2648 1968 d62d8635dc16c516f51561c5a2d533f9.exe 28 PID 1968 wrote to memory of 2648 1968 d62d8635dc16c516f51561c5a2d533f9.exe 28 PID 1968 wrote to memory of 2648 1968 d62d8635dc16c516f51561c5a2d533f9.exe 28 PID 1968 wrote to memory of 2648 1968 d62d8635dc16c516f51561c5a2d533f9.exe 28 PID 1968 wrote to memory of 2648 1968 d62d8635dc16c516f51561c5a2d533f9.exe 28 PID 1968 wrote to memory of 2648 1968 d62d8635dc16c516f51561c5a2d533f9.exe 28 PID 1968 wrote to memory of 2648 1968 d62d8635dc16c516f51561c5a2d533f9.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d62d8635dc16c516f51561c5a2d533f9.exe"C:\Users\Admin\AppData\Local\Temp\d62d8635dc16c516f51561c5a2d533f9.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\juupdate.exe"C:\Users\Admin\AppData\Local\Temp\juupdate.exe" "C:\Users\Admin\AppData\Local\Temp\master.kvh"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5e710026dda5d338a696475ccdad2eef1
SHA179985f4bc32adab9d1133846ac50445ff9e2c5da
SHA2562adb4fdd59322c08222c6c73b6ae69dd22390b30d3ba50f869bf939e560c72f9
SHA512e4f6c2acff673f6c0ca8d193000fe37cd000f9f2ebd7f480220d5c93629cbf1e2129fe73ffac47b2a6cc52132ced3650fece0937e086ca9f3ffb331b5d8e4490
-
Filesize
12KB
MD5c73de7f78a8746668d005fd41cf91aab
SHA1917075a7e2ab88a0ca7240229457fbfe4faa41e1
SHA2566a6e21b03acf3762e18891a1cdd96907aec74c4a6049ab3265c2c7aa57163263
SHA512a7a787ee68cad08677180d5f683c89d42bceba25b30096b7797f427fac06c83425e0378fdf49e5f18cc9c47e8102c1a2c6f04567bbce1748c344b113eadb01ff
-
Filesize
138KB
MD5d1ab72db2bedd2f255d35da3da0d4b16
SHA1860265276b29b42b8c4b077e5c651def9c81b6e9
SHA256047f3c5a7ab0ea05f35b2ca8037bf62dd4228786d07707064dbd0d46569305d0
SHA512b46830742eebc85e731c14f7dc72cc6734fcc79aab46f6080c95589c438c4cca0a069027badc0a8a78e4deeb31cdf38df3d63db679b793212a32efdad7bb8185