Analysis
-
max time kernel
143s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 22:31
Behavioral task
behavioral1
Sample
6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe
Resource
win10v2004-20240426-en
General
-
Target
6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe
-
Size
510KB
-
MD5
fa2d5ff3872f6343be78a266bbc22cd7
-
SHA1
4bf06be74ad1423781865618c66d11b9d20aa494
-
SHA256
6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c
-
SHA512
ea606222ae25041b9102a6261b49be3ac209cd883f740de120cd5565edb9bcffe486e2a14a84c34740cdabde83441681eedf12d1a20855578062e6d0c6b0f780
-
SSDEEP
12288:KkheH6hZYOYrInJ0JvQNy0+wcXP46sBmbvsTlgGrLfhtjQc5:KkheahZnnJsvQNy0+wcXPkB9Tbfhtp
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 8 IoCs
Processes:
resource yara_rule behavioral2/memory/1080-0-0x0000000000400000-0x0000000000496000-memory.dmp UPX behavioral2/memory/1080-3-0x0000000000400000-0x0000000000496000-memory.dmp UPX behavioral2/memory/1080-15-0x0000000000400000-0x0000000000496000-memory.dmp UPX C:\Users\Admin\AppData\Roaming\AppData\jrun32.exe UPX behavioral2/memory/2148-20-0x0000000000400000-0x0000000000496000-memory.dmp UPX behavioral2/memory/2148-27-0x0000000000400000-0x0000000000496000-memory.dmp UPX behavioral2/memory/2148-29-0x0000000000400000-0x0000000000496000-memory.dmp UPX behavioral2/memory/2148-38-0x0000000000400000-0x0000000000496000-memory.dmp UPX -
Executes dropped EXE 3 IoCs
Processes:
jrun32.exejrun32.exejrun32.exepid process 2148 jrun32.exe 572 jrun32.exe 4676 jrun32.exe -
Processes:
resource yara_rule behavioral2/memory/1080-0-0x0000000000400000-0x0000000000496000-memory.dmp upx behavioral2/memory/1080-3-0x0000000000400000-0x0000000000496000-memory.dmp upx behavioral2/memory/1080-15-0x0000000000400000-0x0000000000496000-memory.dmp upx C:\Users\Admin\AppData\Roaming\AppData\jrun32.exe upx behavioral2/memory/2148-20-0x0000000000400000-0x0000000000496000-memory.dmp upx behavioral2/memory/2148-27-0x0000000000400000-0x0000000000496000-memory.dmp upx behavioral2/memory/2148-29-0x0000000000400000-0x0000000000496000-memory.dmp upx behavioral2/memory/2148-38-0x0000000000400000-0x0000000000496000-memory.dmp upx -
Suspicious use of SetThreadContext 3 IoCs
Processes:
6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exejrun32.exedescription pid process target process PID 1080 set thread context of 1120 1080 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe PID 2148 set thread context of 572 2148 jrun32.exe jrun32.exe PID 2148 set thread context of 4676 2148 jrun32.exe jrun32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1520 3568 WerFault.exe ipconfig.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 3568 ipconfig.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exejrun32.exejrun32.exepid process 1080 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe 1120 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe 2148 jrun32.exe 572 jrun32.exe -
Suspicious use of WriteProcessMemory 37 IoCs
Processes:
6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exejrun32.exejrun32.exedescription pid process target process PID 1080 wrote to memory of 1120 1080 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe PID 1080 wrote to memory of 1120 1080 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe PID 1080 wrote to memory of 1120 1080 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe PID 1080 wrote to memory of 1120 1080 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe PID 1080 wrote to memory of 1120 1080 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe PID 1080 wrote to memory of 1120 1080 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe PID 1080 wrote to memory of 1120 1080 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe PID 1080 wrote to memory of 1120 1080 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe PID 1120 wrote to memory of 2148 1120 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe jrun32.exe PID 1120 wrote to memory of 2148 1120 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe jrun32.exe PID 1120 wrote to memory of 2148 1120 6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe jrun32.exe PID 2148 wrote to memory of 572 2148 jrun32.exe jrun32.exe PID 2148 wrote to memory of 572 2148 jrun32.exe jrun32.exe PID 2148 wrote to memory of 572 2148 jrun32.exe jrun32.exe PID 2148 wrote to memory of 572 2148 jrun32.exe jrun32.exe PID 2148 wrote to memory of 572 2148 jrun32.exe jrun32.exe PID 2148 wrote to memory of 572 2148 jrun32.exe jrun32.exe PID 2148 wrote to memory of 572 2148 jrun32.exe jrun32.exe PID 2148 wrote to memory of 572 2148 jrun32.exe jrun32.exe PID 2148 wrote to memory of 4676 2148 jrun32.exe jrun32.exe PID 2148 wrote to memory of 4676 2148 jrun32.exe jrun32.exe PID 2148 wrote to memory of 4676 2148 jrun32.exe jrun32.exe PID 2148 wrote to memory of 4676 2148 jrun32.exe jrun32.exe PID 2148 wrote to memory of 4676 2148 jrun32.exe jrun32.exe PID 2148 wrote to memory of 4676 2148 jrun32.exe jrun32.exe PID 2148 wrote to memory of 4676 2148 jrun32.exe jrun32.exe PID 2148 wrote to memory of 4676 2148 jrun32.exe jrun32.exe PID 2148 wrote to memory of 4676 2148 jrun32.exe jrun32.exe PID 2148 wrote to memory of 4676 2148 jrun32.exe jrun32.exe PID 2148 wrote to memory of 4676 2148 jrun32.exe jrun32.exe PID 2148 wrote to memory of 4676 2148 jrun32.exe jrun32.exe PID 2148 wrote to memory of 4676 2148 jrun32.exe jrun32.exe PID 572 wrote to memory of 3568 572 jrun32.exe ipconfig.exe PID 572 wrote to memory of 3568 572 jrun32.exe ipconfig.exe PID 572 wrote to memory of 3568 572 jrun32.exe ipconfig.exe PID 572 wrote to memory of 3568 572 jrun32.exe ipconfig.exe PID 572 wrote to memory of 3568 572 jrun32.exe ipconfig.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe"C:\Users\Admin\AppData\Local\Temp\6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe"C:\Users\Admin\AppData\Local\Temp\6418eeb9821dcd3fbd7743e2ace2057291a3438fa6da91dbf0eaccc0624ba58c.exe"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Roaming\AppData\jrun32.exeC:\Users\Admin\AppData\Roaming\AppData\jrun32.exe -notray3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Roaming\AppData\jrun32.exe"C:\Users\Admin\AppData\Roaming\AppData\jrun32.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\system32\ipconfig.exe"5⤵
- Gathers network information
PID:3568 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3568 -s 2806⤵
- Program crash
PID:1520
-
-
-
-
C:\Users\Admin\AppData\Roaming\AppData\jrun32.exe"C:\Users\Admin\AppData\Roaming\AppData\jrun32.exe"4⤵
- Executes dropped EXE
PID:4676
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3568 -ip 35681⤵PID:1968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
510KB
MD518fa2721ba6fd477fe5186481dd5148e
SHA13db4a8a92d368e373f014679c07cade6ca97cf54
SHA256a6779f3f06baff8a8bc3244e12f4e90916b10ea1e0199617b20ce91cd6952887
SHA5125a21bc5017bbd67e36b7931c1c096057064fc364042b5692f4cb96767772060291ceddb67737fa7849df1609e1cd097d41877a023e041e6e128e535f52a68274