Analysis
-
max time kernel
150s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 07:41
Static task
static1
Behavioral task
behavioral1
Sample
e900289963173440182b007ee1b0c35d5fefe38c2a02ff852f64d4253c9a8bb6.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e900289963173440182b007ee1b0c35d5fefe38c2a02ff852f64d4253c9a8bb6.exe
Resource
win10v2004-20240709-en
General
-
Target
e900289963173440182b007ee1b0c35d5fefe38c2a02ff852f64d4253c9a8bb6.exe
-
Size
156KB
-
MD5
656a71ccdbbbd4e5c44bb0fed9f2c5c5
-
SHA1
376051595d78a493a1251b448d8d71560e3e2837
-
SHA256
e900289963173440182b007ee1b0c35d5fefe38c2a02ff852f64d4253c9a8bb6
-
SHA512
2238db331921075d8db40426e5749aed1731e6ed0b91e97aec9155f9676bae54306ddd47a9713ba5d77ccc48371f69cb646f972d0c1841607fd9f2f6d1fec66e
-
SSDEEP
1536:40rFzaLHRsNLCNMSG5+SUdqeHAQWXZaNwRRczNoU1LbLkOVQr:TrhadaZLBRWhlLA
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jeiham.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\Control Panel\International\Geo\Nation e900289963173440182b007ee1b0c35d5fefe38c2a02ff852f64d4253c9a8bb6.exe -
Executes dropped EXE 1 IoCs
pid Process 4288 jeiham.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /K" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /A" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /u" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /Z" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /E" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /b" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /k" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /i" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /x" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /V" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /n" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /t" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /z" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /I" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /g" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /e" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /N" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /G" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /O" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /a" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /d" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /f" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /w" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /P" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /X" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /Q" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /s" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /D" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /m" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /y" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /M" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /l" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /W" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /F" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /C" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /J" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /o" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /c" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /v" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /j" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /R" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /p" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /U" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /B" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /H" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /q" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /Y" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /r" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /T" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /S" jeiham.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeiham = "C:\\Users\\Admin\\jeiham.exe /L" jeiham.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe 4288 jeiham.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3268 e900289963173440182b007ee1b0c35d5fefe38c2a02ff852f64d4253c9a8bb6.exe 4288 jeiham.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3268 wrote to memory of 4288 3268 e900289963173440182b007ee1b0c35d5fefe38c2a02ff852f64d4253c9a8bb6.exe 86 PID 3268 wrote to memory of 4288 3268 e900289963173440182b007ee1b0c35d5fefe38c2a02ff852f64d4253c9a8bb6.exe 86 PID 3268 wrote to memory of 4288 3268 e900289963173440182b007ee1b0c35d5fefe38c2a02ff852f64d4253c9a8bb6.exe 86 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82 PID 4288 wrote to memory of 3268 4288 jeiham.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\e900289963173440182b007ee1b0c35d5fefe38c2a02ff852f64d4253c9a8bb6.exe"C:\Users\Admin\AppData\Local\Temp\e900289963173440182b007ee1b0c35d5fefe38c2a02ff852f64d4253c9a8bb6.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Users\Admin\jeiham.exe"C:\Users\Admin\jeiham.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD50e63fd798b23d16fd185f58481f25aad
SHA13934f2e2de0d4f88b9a6d81f651a1c473049d059
SHA2561045a24def94a7acc7df547c15766ab70724da7e209b079b5209535a79edfbc4
SHA5129c990897af77b74e047fb1952e6cf940ee59071953db91b52026a169f7dbfa7d14e0013256e4d49c93fb0ee6474e8a6ef7f99db5ebcc3f59c4e29b26d4b64655