Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 22:47
Static task
static1
Behavioral task
behavioral1
Sample
72bb2bed17d8fff28be231325d68973df673f6e757c82c0e9a62b1a7a5e77365.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
72bb2bed17d8fff28be231325d68973df673f6e757c82c0e9a62b1a7a5e77365.exe
Resource
win10v2004-20240508-en
General
-
Target
72bb2bed17d8fff28be231325d68973df673f6e757c82c0e9a62b1a7a5e77365.exe
-
Size
53KB
-
MD5
270a54ac62ff763a211a155193a6f2c9
-
SHA1
6626745f64be1af8dc9f19bee738074f0f345a74
-
SHA256
72bb2bed17d8fff28be231325d68973df673f6e757c82c0e9a62b1a7a5e77365
-
SHA512
9b6e12ffdcb5679fe17d65b49ccb8e0c465a0cd90a7ca98c6ba87b8a58c6180dac84808bbfcc6521350750b482a5dc45c65fc2a53c2daf131726937917db01d4
-
SSDEEP
1536:vN/g8r8QeC8pFWMC7Kp3StjEMjmLM3ztDJWZsXy4JzxPMk:AC8T9CJJjmLM3zRJWZsXy4Jt
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jousop.exe -
Executes dropped EXE 1 IoCs
pid Process 2216 jousop.exe -
Loads dropped DLL 2 IoCs
pid Process 2176 72bb2bed17d8fff28be231325d68973df673f6e757c82c0e9a62b1a7a5e77365.exe 2176 72bb2bed17d8fff28be231325d68973df673f6e757c82c0e9a62b1a7a5e77365.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\jousop = "C:\\Users\\Admin\\jousop.exe" jousop.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe 2216 jousop.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2176 72bb2bed17d8fff28be231325d68973df673f6e757c82c0e9a62b1a7a5e77365.exe 2216 jousop.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2216 2176 72bb2bed17d8fff28be231325d68973df673f6e757c82c0e9a62b1a7a5e77365.exe 28 PID 2176 wrote to memory of 2216 2176 72bb2bed17d8fff28be231325d68973df673f6e757c82c0e9a62b1a7a5e77365.exe 28 PID 2176 wrote to memory of 2216 2176 72bb2bed17d8fff28be231325d68973df673f6e757c82c0e9a62b1a7a5e77365.exe 28 PID 2176 wrote to memory of 2216 2176 72bb2bed17d8fff28be231325d68973df673f6e757c82c0e9a62b1a7a5e77365.exe 28 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27 PID 2216 wrote to memory of 2176 2216 jousop.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\72bb2bed17d8fff28be231325d68973df673f6e757c82c0e9a62b1a7a5e77365.exe"C:\Users\Admin\AppData\Local\Temp\72bb2bed17d8fff28be231325d68973df673f6e757c82c0e9a62b1a7a5e77365.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\jousop.exe"C:\Users\Admin\jousop.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD5b502eac5e9ffd34a65aae8800c6966d5
SHA14bb6f59dbe5787903bdd6f7ab92dea78f10f25ad
SHA256a5d62598ea3ce168d6a417b77487fbc3f9d9600bf8c2672b35a34c1ff1c8c925
SHA5123b30a235153bc1ac4bebb6976d68690e42fa0c9616d8474d37257c566e9a8a850fa08f344920fa8816691e6727595e8453ac7e47627c78102a8969e79da81774