Analysis
-
max time kernel
142s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 22:31
Behavioral task
behavioral1
Sample
6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe
Resource
win10v2004-20240426-en
General
-
Target
6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe
-
Size
510KB
-
MD5
fa2d5ff3872f6343be78a266bbc22cd7
-
SHA1
4bf06be74ad1423781865618c66d11b9d20aa494
-
SHA256
6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c
-
SHA512
ea606222ae25041b9102a6261b49be3ac209cd883f740de120cd5565edb9bcffe486e2a14a84c34740cdabde83441681eedf12d1a20855578062e6d0c6b0f780
-
SSDEEP
12288:KkheH6hZYOYrInJ0JvQNy0+wcXP46sBmbvsTlgGrLfhtjQc5:KkheahZnnJsvQNy0+wcXPkB9Tbfhtp
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 9 IoCs
Processes:
resource yara_rule behavioral1/memory/2912-0-0x0000000000400000-0x0000000000496000-memory.dmp UPX behavioral1/memory/2912-3-0x0000000000400000-0x0000000000496000-memory.dmp UPX behavioral1/memory/2912-4-0x0000000000400000-0x0000000000496000-memory.dmp UPX behavioral1/memory/2912-27-0x0000000000400000-0x0000000000496000-memory.dmp UPX \Users\Admin\AppData\Roaming\AppData\jrun32.exe UPX behavioral1/memory/2680-37-0x0000000000400000-0x0000000000496000-memory.dmp UPX behavioral1/memory/2680-41-0x0000000000400000-0x0000000000496000-memory.dmp UPX behavioral1/memory/2680-52-0x0000000000400000-0x0000000000496000-memory.dmp UPX behavioral1/memory/2680-77-0x0000000000400000-0x0000000000496000-memory.dmp UPX -
Executes dropped EXE 3 IoCs
Processes:
jrun32.exejrun32.exejrun32.exepid process 2680 jrun32.exe 2936 jrun32.exe 2408 jrun32.exe -
Loads dropped DLL 2 IoCs
Processes:
6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exepid process 2608 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe 2608 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe -
Processes:
resource yara_rule behavioral1/memory/2912-0-0x0000000000400000-0x0000000000496000-memory.dmp upx behavioral1/memory/2912-3-0x0000000000400000-0x0000000000496000-memory.dmp upx behavioral1/memory/2912-4-0x0000000000400000-0x0000000000496000-memory.dmp upx behavioral1/memory/2912-27-0x0000000000400000-0x0000000000496000-memory.dmp upx \Users\Admin\AppData\Roaming\AppData\jrun32.exe upx behavioral1/memory/2680-37-0x0000000000400000-0x0000000000496000-memory.dmp upx behavioral1/memory/2680-41-0x0000000000400000-0x0000000000496000-memory.dmp upx behavioral1/memory/2680-52-0x0000000000400000-0x0000000000496000-memory.dmp upx behavioral1/memory/2680-77-0x0000000000400000-0x0000000000496000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\jrun32 = "C:\\Users\\Admin\\AppData\\Roaming\\AppData\\jrun32.exe -notray" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exejrun32.exedescription pid process target process PID 2912 set thread context of 2608 2912 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe PID 2680 set thread context of 2936 2680 jrun32.exe jrun32.exe PID 2680 set thread context of 2408 2680 jrun32.exe jrun32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 2868 ipconfig.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exejrun32.exejrun32.exepid process 2912 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe 2608 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe 2680 jrun32.exe 2936 jrun32.exe -
Suspicious use of WriteProcessMemory 48 IoCs
Processes:
6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exejrun32.exejrun32.exeipconfig.execmd.exedescription pid process target process PID 2912 wrote to memory of 2608 2912 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe PID 2912 wrote to memory of 2608 2912 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe PID 2912 wrote to memory of 2608 2912 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe PID 2912 wrote to memory of 2608 2912 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe PID 2912 wrote to memory of 2608 2912 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe PID 2912 wrote to memory of 2608 2912 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe PID 2912 wrote to memory of 2608 2912 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe PID 2912 wrote to memory of 2608 2912 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe PID 2912 wrote to memory of 2608 2912 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe PID 2608 wrote to memory of 2680 2608 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe jrun32.exe PID 2608 wrote to memory of 2680 2608 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe jrun32.exe PID 2608 wrote to memory of 2680 2608 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe jrun32.exe PID 2608 wrote to memory of 2680 2608 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe jrun32.exe PID 2680 wrote to memory of 2936 2680 jrun32.exe jrun32.exe PID 2680 wrote to memory of 2936 2680 jrun32.exe jrun32.exe PID 2680 wrote to memory of 2936 2680 jrun32.exe jrun32.exe PID 2680 wrote to memory of 2936 2680 jrun32.exe jrun32.exe PID 2680 wrote to memory of 2936 2680 jrun32.exe jrun32.exe PID 2680 wrote to memory of 2936 2680 jrun32.exe jrun32.exe PID 2680 wrote to memory of 2936 2680 jrun32.exe jrun32.exe PID 2680 wrote to memory of 2936 2680 jrun32.exe jrun32.exe PID 2680 wrote to memory of 2936 2680 jrun32.exe jrun32.exe PID 2680 wrote to memory of 2408 2680 jrun32.exe jrun32.exe PID 2680 wrote to memory of 2408 2680 jrun32.exe jrun32.exe PID 2680 wrote to memory of 2408 2680 jrun32.exe jrun32.exe PID 2680 wrote to memory of 2408 2680 jrun32.exe jrun32.exe PID 2680 wrote to memory of 2408 2680 jrun32.exe jrun32.exe PID 2680 wrote to memory of 2408 2680 jrun32.exe jrun32.exe PID 2680 wrote to memory of 2408 2680 jrun32.exe jrun32.exe PID 2680 wrote to memory of 2408 2680 jrun32.exe jrun32.exe PID 2680 wrote to memory of 2408 2680 jrun32.exe jrun32.exe PID 2680 wrote to memory of 2408 2680 jrun32.exe jrun32.exe PID 2680 wrote to memory of 2408 2680 jrun32.exe jrun32.exe PID 2680 wrote to memory of 2408 2680 jrun32.exe jrun32.exe PID 2936 wrote to memory of 2868 2936 jrun32.exe ipconfig.exe PID 2936 wrote to memory of 2868 2936 jrun32.exe ipconfig.exe PID 2936 wrote to memory of 2868 2936 jrun32.exe ipconfig.exe PID 2936 wrote to memory of 2868 2936 jrun32.exe ipconfig.exe PID 2936 wrote to memory of 2868 2936 jrun32.exe ipconfig.exe PID 2936 wrote to memory of 2868 2936 jrun32.exe ipconfig.exe PID 2868 wrote to memory of 1564 2868 ipconfig.exe cmd.exe PID 2868 wrote to memory of 1564 2868 ipconfig.exe cmd.exe PID 2868 wrote to memory of 1564 2868 ipconfig.exe cmd.exe PID 2868 wrote to memory of 1564 2868 ipconfig.exe cmd.exe PID 1564 wrote to memory of 1264 1564 cmd.exe reg.exe PID 1564 wrote to memory of 1264 1564 cmd.exe reg.exe PID 1564 wrote to memory of 1264 1564 cmd.exe reg.exe PID 1564 wrote to memory of 1264 1564 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe"C:\Users\Admin\AppData\Local\Temp\6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe"C:\Users\Admin\AppData\Local\Temp\6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Roaming\AppData\jrun32.exeC:\Users\Admin\AppData\Roaming\AppData\jrun32.exe -notray3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Roaming\AppData\jrun32.exe"C:\Users\Admin\AppData\Roaming\AppData\jrun32.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\system32\ipconfig.exe"5⤵
- Gathers network information
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\IVRAUYWK.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v jrun32 /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\AppData\jrun32.exe -notray" /f7⤵
- Adds Run key to start application
- Modifies registry key
PID:1264
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\AppData\jrun32.exe"C:\Users\Admin\AppData\Roaming\AppData\jrun32.exe"4⤵
- Executes dropped EXE
PID:2408
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
146B
MD5f43ed9d2c73208eded7959a9b78c7814
SHA1d8f0db46acffd54bd87051ad8e46f73b8dd47961
SHA256707c5b61af860c851e76c8173f36a852089f68985a25356b1e47711265cea7f6
SHA512b06f43d4029e372a53b36df2fc3091b7b546c65074770da3adb88be3c96c4288cc0247fb7408804f96ddbb6df305f230f288aa30355bf7b22865216130671d0d
-
Filesize
510KB
MD548093f582f04452916ea3b0352b52c65
SHA16c509648baec0d69a539b0456d4437270e9aad00
SHA2569c6686d1733c85d9bcd8359b97bd834ddba1df2245e209be5356771fdc19230b
SHA512843c57918cc0e90d4ba0de46235d2ca9063890e032e5a79a1d1c076f58a00db9b7107fc2c2c482a09b1f700ad5f51904dde806186a7ae44309ae6da06da15028