Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 03:01
Static task
static1
Behavioral task
behavioral1
Sample
c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exe
Resource
win10v2004-20240226-en
General
-
Target
c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exe
-
Size
476KB
-
MD5
9075c89769ea746773b3ae9db06d47d9
-
SHA1
3d0d989a44e89f44071487a179762cac54708b88
-
SHA256
c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138
-
SHA512
2db55d4b971bbc6180e5ca9ce2ffa2f88fb7aeba3c3cdd1973b4072b562e15e8e53417633b7dab7abd7cac3c0a2a3e140ea502c51a899f2be82c913601e0a4cd
-
SSDEEP
3072:Jin8r+coP2W0XgEU5IuY2R8FD8edLhb9x4CuSqhAp08FkGRnNrdf45AjqKnoem:23P0KPsvKhAp081nNVjqKoe
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 6 IoCs
Processes:
resource yara_rule behavioral1/memory/11224-26759-0x0000000000400000-0x000000000040B000-memory.dmp UPX behavioral1/memory/11224-26758-0x0000000000400000-0x000000000040B000-memory.dmp UPX behavioral1/memory/11224-26757-0x0000000000400000-0x000000000040B000-memory.dmp UPX behavioral1/memory/11224-26754-0x0000000000400000-0x000000000040B000-memory.dmp UPX behavioral1/memory/11224-26801-0x0000000000400000-0x000000000040B000-memory.dmp UPX behavioral1/memory/11224-53540-0x0000000000400000-0x000000000040B000-memory.dmp UPX -
Executes dropped EXE 2 IoCs
Processes:
JREUPD7.exeJREUPD7.exepid process 11412 JREUPD7.exe 29868 JREUPD7.exe -
Loads dropped DLL 5 IoCs
Processes:
c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exepid process 11224 c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exe 11224 c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exe 11224 c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exe 11224 c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exe 11224 c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exe -
Processes:
resource yara_rule behavioral1/memory/11224-26759-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/11224-26758-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/11224-26757-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/11224-26754-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/11224-26752-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/11224-26801-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/11224-53540-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\JREsp7 = "C:\\Users\\Admin\\AppData\\Roaming\\SunJavaJREupdate7\\JREUPD7.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exeJREUPD7.exedescription pid process target process PID 2320 set thread context of 11224 2320 c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exe c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exe PID 11412 set thread context of 29868 11412 JREUPD7.exe JREUPD7.exe PID 11412 set thread context of 29932 11412 JREUPD7.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
JREUPD7.exedescription pid process Token: SeDebugPrivilege 29868 JREUPD7.exe Token: SeDebugPrivilege 29868 JREUPD7.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exec5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exeJREUPD7.exeJREUPD7.exepid process 2320 c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exe 11224 c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exe 11412 JREUPD7.exe 29868 JREUPD7.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exec5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.execmd.exeJREUPD7.exedescription pid process target process PID 2320 wrote to memory of 11224 2320 c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exe c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exe PID 2320 wrote to memory of 11224 2320 c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exe c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exe PID 2320 wrote to memory of 11224 2320 c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exe c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exe PID 2320 wrote to memory of 11224 2320 c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exe c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exe PID 2320 wrote to memory of 11224 2320 c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exe c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exe PID 2320 wrote to memory of 11224 2320 c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exe c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exe PID 2320 wrote to memory of 11224 2320 c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exe c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exe PID 2320 wrote to memory of 11224 2320 c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exe c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exe PID 11224 wrote to memory of 11328 11224 c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exe cmd.exe PID 11224 wrote to memory of 11328 11224 c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exe cmd.exe PID 11224 wrote to memory of 11328 11224 c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exe cmd.exe PID 11224 wrote to memory of 11328 11224 c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exe cmd.exe PID 11328 wrote to memory of 11384 11328 cmd.exe reg.exe PID 11328 wrote to memory of 11384 11328 cmd.exe reg.exe PID 11328 wrote to memory of 11384 11328 cmd.exe reg.exe PID 11328 wrote to memory of 11384 11328 cmd.exe reg.exe PID 11224 wrote to memory of 11412 11224 c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exe JREUPD7.exe PID 11224 wrote to memory of 11412 11224 c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exe JREUPD7.exe PID 11224 wrote to memory of 11412 11224 c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exe JREUPD7.exe PID 11224 wrote to memory of 11412 11224 c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exe JREUPD7.exe PID 11412 wrote to memory of 29868 11412 JREUPD7.exe JREUPD7.exe PID 11412 wrote to memory of 29868 11412 JREUPD7.exe JREUPD7.exe PID 11412 wrote to memory of 29868 11412 JREUPD7.exe JREUPD7.exe PID 11412 wrote to memory of 29868 11412 JREUPD7.exe JREUPD7.exe PID 11412 wrote to memory of 29868 11412 JREUPD7.exe JREUPD7.exe PID 11412 wrote to memory of 29868 11412 JREUPD7.exe JREUPD7.exe PID 11412 wrote to memory of 29868 11412 JREUPD7.exe JREUPD7.exe PID 11412 wrote to memory of 29868 11412 JREUPD7.exe JREUPD7.exe PID 11412 wrote to memory of 29932 11412 JREUPD7.exe svchost.exe PID 11412 wrote to memory of 29932 11412 JREUPD7.exe svchost.exe PID 11412 wrote to memory of 29932 11412 JREUPD7.exe svchost.exe PID 11412 wrote to memory of 29932 11412 JREUPD7.exe svchost.exe PID 11412 wrote to memory of 29932 11412 JREUPD7.exe svchost.exe PID 11412 wrote to memory of 29932 11412 JREUPD7.exe svchost.exe PID 11412 wrote to memory of 29932 11412 JREUPD7.exe svchost.exe PID 11412 wrote to memory of 29932 11412 JREUPD7.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exe"C:\Users\Admin\AppData\Local\Temp\c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exe"C:\Users\Admin\AppData\Local\Temp\c5c2adc772d9d886de7207b7b3ea130f81a769764312924845aa0ea0de5cf138.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\GMYLT.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "JREsp7" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\SunJavaJREupdate7\JREUPD7.exe" /f4⤵
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\SunJavaJREupdate7\JREUPD7.exe"C:\Users\Admin\AppData\Roaming\SunJavaJREupdate7\JREUPD7.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\SunJavaJREupdate7\JREUPD7.exe"C:\Users\Admin\AppData\Roaming\SunJavaJREupdate7\JREUPD7.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"4⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\GMYLT.batFilesize
153B
MD5a5ab6d6b7f03c59f02ebde6e2834fe42
SHA1567e8e08dcb41c365116e5806676d89e2b9f522a
SHA2562dfac769e0e863a3f534444566bbc908edb7fed1981feed55a8f402cc7a3e506
SHA512271f94ed4f69eb40012e26aae164a0332bc3695d08f119e82096a4a14e15631e8a6ee7c8095d047ba5e2ae03e364c010b873a5f3191ab88a835ae2227ddc30bd
-
\Users\Admin\AppData\Roaming\SunJavaJREupdate7\JREUPD7.exeFilesize
476KB
MD58dc118351ff2d6d6904eb4154672c4b1
SHA14e82e649fc5c4bed902e6f140c3f8ff2283ffb91
SHA25632d60b346d1108fdc2cb7227e91fed2eb7e58cb5eace936b122735e169754b4d
SHA512bee4cea351037230db1385ea54e4162f831c74fb6648a4ca39cd6c4e9178b2c5d93836d5593e2f91790d9581c733d3cbb22f9cc9e2fd7f060e23341851609b77
-
memory/2320-2-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB
-
memory/2320-100-0x00000000026C0000-0x00000000026C1000-memory.dmpFilesize
4KB
-
memory/2320-99-0x0000000002660000-0x0000000002661000-memory.dmpFilesize
4KB
-
memory/2320-101-0x0000000002660000-0x0000000002661000-memory.dmpFilesize
4KB
-
memory/11224-26757-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/11224-26756-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/11224-26754-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/11224-26752-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/11224-26750-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/11224-26758-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/11224-26759-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/11224-26801-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/11224-53540-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB