Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-03-2024 09:13
Static task
static1
Behavioral task
behavioral1
Sample
d86f9b4228662e425a24fd1c13617087.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d86f9b4228662e425a24fd1c13617087.exe
Resource
win10v2004-20240226-en
General
-
Target
d86f9b4228662e425a24fd1c13617087.exe
-
Size
293KB
-
MD5
d86f9b4228662e425a24fd1c13617087
-
SHA1
0203e3d73b79d1560c9cb793241b0cb7a9686974
-
SHA256
1ef7db195fc7d94d8761d52f07b57f9e284dae1008af96fea13ec96f205c8ce7
-
SHA512
252cb4d558abe39c00ad4b89556ed3c4eddb6315ecf2e83198156997e01dedd078633bebae396435cbf8c29892e6f7bd1180bd94de18c682889b145125f06928
-
SSDEEP
6144:bPdM9MANEVzGlcEDUl4qaRYVQLJTGbusJRhgnGXcLD7Xm2BeddhMHAO+9d:wNEh8cSLqdIsisDhgnG4BBedDMgO+P
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1756 yjruu.exe -
Loads dropped DLL 2 IoCs
pid Process 2240 d86f9b4228662e425a24fd1c13617087.exe 2240 d86f9b4228662e425a24fd1c13617087.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\{8AB77948-8466-AD4E-E8B6-6988D6F14A95} = "C:\\Users\\Admin\\AppData\\Roaming\\Juala\\yjruu.exe" yjruu.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2240 set thread context of 1128 2240 d86f9b4228662e425a24fd1c13617087.exe 29 -
Program crash 2 IoCs
pid pid_target Process procid_target 2708 1128 WerFault.exe 29 2552 2708 WerFault.exe 31 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Privacy d86f9b4228662e425a24fd1c13617087.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" d86f9b4228662e425a24fd1c13617087.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1756 yjruu.exe 1756 yjruu.exe 1756 yjruu.exe 1756 yjruu.exe 1756 yjruu.exe 1756 yjruu.exe 1756 yjruu.exe 1756 yjruu.exe 1756 yjruu.exe 1756 yjruu.exe 1756 yjruu.exe 1756 yjruu.exe 1756 yjruu.exe 1756 yjruu.exe 1756 yjruu.exe 1756 yjruu.exe 1756 yjruu.exe 1756 yjruu.exe 1756 yjruu.exe 1756 yjruu.exe 1756 yjruu.exe 1756 yjruu.exe 1756 yjruu.exe 1756 yjruu.exe 1756 yjruu.exe 1756 yjruu.exe 1756 yjruu.exe 1756 yjruu.exe 1756 yjruu.exe 1756 yjruu.exe 1756 yjruu.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 2240 d86f9b4228662e425a24fd1c13617087.exe Token: SeSecurityPrivilege 2240 d86f9b4228662e425a24fd1c13617087.exe Token: SeSecurityPrivilege 2240 d86f9b4228662e425a24fd1c13617087.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2240 d86f9b4228662e425a24fd1c13617087.exe 1756 yjruu.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2240 wrote to memory of 1756 2240 d86f9b4228662e425a24fd1c13617087.exe 28 PID 2240 wrote to memory of 1756 2240 d86f9b4228662e425a24fd1c13617087.exe 28 PID 2240 wrote to memory of 1756 2240 d86f9b4228662e425a24fd1c13617087.exe 28 PID 2240 wrote to memory of 1756 2240 d86f9b4228662e425a24fd1c13617087.exe 28 PID 1756 wrote to memory of 1220 1756 yjruu.exe 19 PID 1756 wrote to memory of 1220 1756 yjruu.exe 19 PID 1756 wrote to memory of 1220 1756 yjruu.exe 19 PID 1756 wrote to memory of 1220 1756 yjruu.exe 19 PID 1756 wrote to memory of 1220 1756 yjruu.exe 19 PID 1756 wrote to memory of 1352 1756 yjruu.exe 20 PID 1756 wrote to memory of 1352 1756 yjruu.exe 20 PID 1756 wrote to memory of 1352 1756 yjruu.exe 20 PID 1756 wrote to memory of 1352 1756 yjruu.exe 20 PID 1756 wrote to memory of 1352 1756 yjruu.exe 20 PID 1756 wrote to memory of 1412 1756 yjruu.exe 21 PID 1756 wrote to memory of 1412 1756 yjruu.exe 21 PID 1756 wrote to memory of 1412 1756 yjruu.exe 21 PID 1756 wrote to memory of 1412 1756 yjruu.exe 21 PID 1756 wrote to memory of 1412 1756 yjruu.exe 21 PID 1756 wrote to memory of 872 1756 yjruu.exe 23 PID 1756 wrote to memory of 872 1756 yjruu.exe 23 PID 1756 wrote to memory of 872 1756 yjruu.exe 23 PID 1756 wrote to memory of 872 1756 yjruu.exe 23 PID 1756 wrote to memory of 872 1756 yjruu.exe 23 PID 1756 wrote to memory of 2240 1756 yjruu.exe 27 PID 1756 wrote to memory of 2240 1756 yjruu.exe 27 PID 1756 wrote to memory of 2240 1756 yjruu.exe 27 PID 1756 wrote to memory of 2240 1756 yjruu.exe 27 PID 1756 wrote to memory of 2240 1756 yjruu.exe 27 PID 2240 wrote to memory of 1128 2240 d86f9b4228662e425a24fd1c13617087.exe 29 PID 2240 wrote to memory of 1128 2240 d86f9b4228662e425a24fd1c13617087.exe 29 PID 2240 wrote to memory of 1128 2240 d86f9b4228662e425a24fd1c13617087.exe 29 PID 2240 wrote to memory of 1128 2240 d86f9b4228662e425a24fd1c13617087.exe 29 PID 2240 wrote to memory of 1128 2240 d86f9b4228662e425a24fd1c13617087.exe 29 PID 2240 wrote to memory of 1128 2240 d86f9b4228662e425a24fd1c13617087.exe 29 PID 2240 wrote to memory of 1128 2240 d86f9b4228662e425a24fd1c13617087.exe 29 PID 2240 wrote to memory of 1128 2240 d86f9b4228662e425a24fd1c13617087.exe 29 PID 2240 wrote to memory of 1128 2240 d86f9b4228662e425a24fd1c13617087.exe 29 PID 1128 wrote to memory of 2708 1128 cmd.exe 31 PID 1128 wrote to memory of 2708 1128 cmd.exe 31 PID 1128 wrote to memory of 2708 1128 cmd.exe 31 PID 1128 wrote to memory of 2708 1128 cmd.exe 31 PID 1756 wrote to memory of 1640 1756 yjruu.exe 30 PID 1756 wrote to memory of 1640 1756 yjruu.exe 30 PID 1756 wrote to memory of 1640 1756 yjruu.exe 30 PID 1756 wrote to memory of 1640 1756 yjruu.exe 30 PID 1756 wrote to memory of 1640 1756 yjruu.exe 30 PID 1756 wrote to memory of 2708 1756 yjruu.exe 31 PID 1756 wrote to memory of 2708 1756 yjruu.exe 31 PID 1756 wrote to memory of 2708 1756 yjruu.exe 31 PID 1756 wrote to memory of 2708 1756 yjruu.exe 31 PID 1756 wrote to memory of 2708 1756 yjruu.exe 31 PID 2708 wrote to memory of 2552 2708 WerFault.exe 32 PID 2708 wrote to memory of 2552 2708 WerFault.exe 32 PID 2708 wrote to memory of 2552 2708 WerFault.exe 32 PID 2708 wrote to memory of 2552 2708 WerFault.exe 32
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1220
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1352
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\d86f9b4228662e425a24fd1c13617087.exe"C:\Users\Admin\AppData\Local\Temp\d86f9b4228662e425a24fd1c13617087.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Roaming\Juala\yjruu.exe"C:\Users\Admin\AppData\Roaming\Juala\yjruu.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1756
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp44156433.bat"3⤵
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1128 -s 1164⤵
- Program crash
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 5365⤵
- Program crash
PID:2552
-
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:872
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1186406822-1341058132-1551836569-412826823-142575701-755290104-6893394921249159978"1⤵PID:1640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
366B
MD5318364d4079cdfe80fe8d52d3714da65
SHA14a212e4918fef4c47149d296b9144842a7560ab7
SHA2563986d21088ab4205ae612bcb02f5e9f403863f0e9b0ff8e98dd2162b5821862d
SHA512deeae353462560320cd00910a96e24724a0e696ec55b627f9b032879f9946f7db65f3159d859be36557a556249f66d4d35ff9fe441e2d2531a98b21aaa02751c
-
Filesize
293KB
MD532c512f6f53f0933f863e27db93840d6
SHA1acce3edb21139feeb3fb4399156cfe0e81bf6069
SHA2561f2801c809cbec06b2cc4a709ff1c8759dfb0d672f63231d69e9693e8bed487c
SHA512b1b6be2f2a3c9d7252a3512a3a1bc9b096819864ecf64736871a26babde8582cbf2f1a4e13b6314d4de7ec326f5288e936b6b51779ff48647ff83dda184f4f52