Analysis

  • max time kernel
    151s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26/03/2024, 19:27

General

  • Target

    411c96f88ec9539de83a7f185c22669e2e133e250e9e993a277c737d7cf08432.exe

  • Size

    132KB

  • MD5

    4adcb7053e3faf07cb95b303c5b3971e

  • SHA1

    8b41cd3bbaef75ba99c6fcd90fd79a4cc7e519ab

  • SHA256

    411c96f88ec9539de83a7f185c22669e2e133e250e9e993a277c737d7cf08432

  • SHA512

    0c21ad490c5b4d770683b65c43ddda28c854afadd8c9c1df9c163b69b6c35582ce301d334e4b460dcc6bb31c54ae275be4bd3e8f689c0a30313d8b2f7b9a43c4

  • SSDEEP

    1536:MqxPEeTIKsTXFixXVG4e2JLBJ3Ue05znybzPe9j1wo7JaSU:rEeTIKsbFixFG4e1ybGBwQG

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\411c96f88ec9539de83a7f185c22669e2e133e250e9e993a277c737d7cf08432.exe
    "C:\Users\Admin\AppData\Local\Temp\411c96f88ec9539de83a7f185c22669e2e133e250e9e993a277c737d7cf08432.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Users\Admin\jigif.exe
      "C:\Users\Admin\jigif.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2852

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\jigif.exe

          Filesize

          132KB

          MD5

          65431818c339c9c3be3b6234a00636ef

          SHA1

          27e9aef7e420f2052ae43eba934f27417b91fbf8

          SHA256

          3491212fb45bbf669ae969cb869591280c626d60bf0b647cda9360e5baf60394

          SHA512

          3bfc1463057ec6b14c180725531936118a543770b2935d5c138476eaddae4ae890016aac606d77d1bd462f45a53b948f00aaab001493a6fa109630bd71367326