Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09-07-2024 07:01
Static task
static1
Behavioral task
behavioral1
Sample
ec5242962e2a9c707c2b384d21a2188587785d3cf393efe6a6fee2158891fe71.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ec5242962e2a9c707c2b384d21a2188587785d3cf393efe6a6fee2158891fe71.exe
Resource
win10v2004-20240704-en
General
-
Target
ec5242962e2a9c707c2b384d21a2188587785d3cf393efe6a6fee2158891fe71.exe
-
Size
53KB
-
MD5
e5fb0b9a31661d5fc7f811756506cf52
-
SHA1
abe8882e471bb0a60c2cb046b2cfb073b973c036
-
SHA256
ec5242962e2a9c707c2b384d21a2188587785d3cf393efe6a6fee2158891fe71
-
SHA512
56f1252a010af81c8de7d9d73ce4f16fae5211a68505c5df702accc7af2e0a8e61f0c4cbd2c7889bf04891f7ecb006a354657403d65c1f31adcf8b31f48b6fb8
-
SSDEEP
1536:vNBg8r8Q/QmxT7Kp3StjEMjmLM3ztDJWZsXy4JzxPMk:zQmZJJjmLM3zRJWZsXy4JN
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jouiyeg.exe -
Executes dropped EXE 1 IoCs
pid Process 2712 jouiyeg.exe -
Loads dropped DLL 2 IoCs
pid Process 2692 ec5242962e2a9c707c2b384d21a2188587785d3cf393efe6a6fee2158891fe71.exe 2692 ec5242962e2a9c707c2b384d21a2188587785d3cf393efe6a6fee2158891fe71.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\jouiyeg = "C:\\Users\\Admin\\jouiyeg.exe" jouiyeg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe 2712 jouiyeg.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2692 ec5242962e2a9c707c2b384d21a2188587785d3cf393efe6a6fee2158891fe71.exe 2712 jouiyeg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2712 2692 ec5242962e2a9c707c2b384d21a2188587785d3cf393efe6a6fee2158891fe71.exe 30 PID 2692 wrote to memory of 2712 2692 ec5242962e2a9c707c2b384d21a2188587785d3cf393efe6a6fee2158891fe71.exe 30 PID 2692 wrote to memory of 2712 2692 ec5242962e2a9c707c2b384d21a2188587785d3cf393efe6a6fee2158891fe71.exe 30 PID 2692 wrote to memory of 2712 2692 ec5242962e2a9c707c2b384d21a2188587785d3cf393efe6a6fee2158891fe71.exe 30 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29 PID 2712 wrote to memory of 2692 2712 jouiyeg.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec5242962e2a9c707c2b384d21a2188587785d3cf393efe6a6fee2158891fe71.exe"C:\Users\Admin\AppData\Local\Temp\ec5242962e2a9c707c2b384d21a2188587785d3cf393efe6a6fee2158891fe71.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\jouiyeg.exe"C:\Users\Admin\jouiyeg.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD557bb2a740ff4d9c8df7df49f47758389
SHA18008ab01e56776f61a7e6c58b404dc275628710f
SHA25628411b3a0dd5cf36f0a20b4946f68a708bbbf7fca73e3c2a6735f5311e09a5bd
SHA512b4509c8059a496a631985660a9aa8b9550e10eed520a555f6aa1ca7d8a1417e74196be1e043494d8c5e9dcd3c3f2af59e88a70a1b2bd9855ef9b683656917aab