Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 19:32
Static task
static1
Behavioral task
behavioral1
Sample
243ee9310fb95b80b9c8d8bcd6eb6e1fd98f8d72eddd74c660ca74557a1d8d78.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
243ee9310fb95b80b9c8d8bcd6eb6e1fd98f8d72eddd74c660ca74557a1d8d78.exe
Resource
win10v2004-20240508-en
General
-
Target
243ee9310fb95b80b9c8d8bcd6eb6e1fd98f8d72eddd74c660ca74557a1d8d78.exe
-
Size
67KB
-
MD5
75c98370d7198d2bc9109e2fff173018
-
SHA1
4b6f6789062cb023cbcfbdeb5b414b1b3a1cb876
-
SHA256
243ee9310fb95b80b9c8d8bcd6eb6e1fd98f8d72eddd74c660ca74557a1d8d78
-
SHA512
44f836311e39d22138d680939af2219ace24bcd648b4ced65cb2a747753a02e45fcc33c29eba54152f45d4fb96e2a9edb21da0a9d8465986c62829935cff3d60
-
SSDEEP
1536:EvQoLHjw2iWPKMvw71sMLyXuhcVVVOHHHZN666MvvvvZ:Ev5Ls27BIJsMLyXuhbHHH7666Q
Malware Config
Signatures
-
Detects Windows executables referencing non-Windows User-Agents 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023400-2.dat INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 243ee9310fb95b80b9c8d8bcd6eb6e1fd98f8d72eddd74c660ca74557a1d8d78.exe -
Executes dropped EXE 1 IoCs
pid Process 380 jkmhost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Debug\jkmhost.exe 243ee9310fb95b80b9c8d8bcd6eb6e1fd98f8d72eddd74c660ca74557a1d8d78.exe File opened for modification C:\Windows\Debug\jkmhost.exe 243ee9310fb95b80b9c8d8bcd6eb6e1fd98f8d72eddd74c660ca74557a1d8d78.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 468 243ee9310fb95b80b9c8d8bcd6eb6e1fd98f8d72eddd74c660ca74557a1d8d78.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 468 wrote to memory of 2956 468 243ee9310fb95b80b9c8d8bcd6eb6e1fd98f8d72eddd74c660ca74557a1d8d78.exe 87 PID 468 wrote to memory of 2956 468 243ee9310fb95b80b9c8d8bcd6eb6e1fd98f8d72eddd74c660ca74557a1d8d78.exe 87 PID 468 wrote to memory of 2956 468 243ee9310fb95b80b9c8d8bcd6eb6e1fd98f8d72eddd74c660ca74557a1d8d78.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\243ee9310fb95b80b9c8d8bcd6eb6e1fd98f8d72eddd74c660ca74557a1d8d78.exe"C:\Users\Admin\AppData\Local\Temp\243ee9310fb95b80b9c8d8bcd6eb6e1fd98f8d72eddd74c660ca74557a1d8d78.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\243EE9~1.EXE > nul2⤵PID:2956
-
-
C:\Windows\Debug\jkmhost.exeC:\Windows\Debug\jkmhost.exe1⤵
- Executes dropped EXE
PID:380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5b5fc891ae47451aac7e7e2a794c9f0e6
SHA14f6a9487a0caf9d36b5aefec1ad09a3c01c333a3
SHA256e222dcc3e0a40e1a032a15578263949ed4e908b516cf496bad0597a753830a0a
SHA51210c16f57da25d8d0ce677f258d3aa0efb644f8ec133ef3b6945f148e828947d7b1d633af109e0edb122ccb61e6d2d9c733c16b485abedd9d4c1bd6c9f46777e8