Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/08/2024, 00:07
Static task
static1
Behavioral task
behavioral1
Sample
836203b45f3b8a926f90cfbcd365f7188d3b64ed3deb6860a8b0a9e8a448687a.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
836203b45f3b8a926f90cfbcd365f7188d3b64ed3deb6860a8b0a9e8a448687a.exe
Resource
win10v2004-20240802-en
General
-
Target
836203b45f3b8a926f90cfbcd365f7188d3b64ed3deb6860a8b0a9e8a448687a.exe
-
Size
184KB
-
MD5
226ab9d3faac16759e05b8e5781089c2
-
SHA1
47181cf51d919b59883793741484b3f4b5e73dd5
-
SHA256
836203b45f3b8a926f90cfbcd365f7188d3b64ed3deb6860a8b0a9e8a448687a
-
SHA512
7e8078ecc94f6d169f692cf45e58a5baf8efc7520410f707fe9cc7cacb377c8d1759b308e1a17a87cb1568ffb3d9732e51013721fae7997e11c540daec298f47
-
SSDEEP
3072:427mqUfrYZZ7JSUiSeG8uke3p3NlqVn2turIi/x37bWAC1/9iSBKLonj3:3yqUoZ7cUig8mJNl2Rr3Z3lAFNB9nb
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\ljigcfft.exe" 836203b45f3b8a926f90cfbcd365f7188d3b64ed3deb6860a8b0a9e8a448687a.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: 836203b45f3b8a926f90cfbcd365f7188d3b64ed3deb6860a8b0a9e8a448687a.exe File opened (read-only) \??\O: 836203b45f3b8a926f90cfbcd365f7188d3b64ed3deb6860a8b0a9e8a448687a.exe File opened (read-only) \??\T: 836203b45f3b8a926f90cfbcd365f7188d3b64ed3deb6860a8b0a9e8a448687a.exe File opened (read-only) \??\X: 836203b45f3b8a926f90cfbcd365f7188d3b64ed3deb6860a8b0a9e8a448687a.exe File opened (read-only) \??\A: 836203b45f3b8a926f90cfbcd365f7188d3b64ed3deb6860a8b0a9e8a448687a.exe File opened (read-only) \??\H: 836203b45f3b8a926f90cfbcd365f7188d3b64ed3deb6860a8b0a9e8a448687a.exe File opened (read-only) \??\I: 836203b45f3b8a926f90cfbcd365f7188d3b64ed3deb6860a8b0a9e8a448687a.exe File opened (read-only) \??\Q: 836203b45f3b8a926f90cfbcd365f7188d3b64ed3deb6860a8b0a9e8a448687a.exe File opened (read-only) \??\Y: 836203b45f3b8a926f90cfbcd365f7188d3b64ed3deb6860a8b0a9e8a448687a.exe File opened (read-only) \??\B: 836203b45f3b8a926f90cfbcd365f7188d3b64ed3deb6860a8b0a9e8a448687a.exe File opened (read-only) \??\G: 836203b45f3b8a926f90cfbcd365f7188d3b64ed3deb6860a8b0a9e8a448687a.exe File opened (read-only) \??\K: 836203b45f3b8a926f90cfbcd365f7188d3b64ed3deb6860a8b0a9e8a448687a.exe File opened (read-only) \??\M: 836203b45f3b8a926f90cfbcd365f7188d3b64ed3deb6860a8b0a9e8a448687a.exe File opened (read-only) \??\S: 836203b45f3b8a926f90cfbcd365f7188d3b64ed3deb6860a8b0a9e8a448687a.exe File opened (read-only) \??\U: 836203b45f3b8a926f90cfbcd365f7188d3b64ed3deb6860a8b0a9e8a448687a.exe File opened (read-only) \??\V: 836203b45f3b8a926f90cfbcd365f7188d3b64ed3deb6860a8b0a9e8a448687a.exe File opened (read-only) \??\Z: 836203b45f3b8a926f90cfbcd365f7188d3b64ed3deb6860a8b0a9e8a448687a.exe File opened (read-only) \??\E: 836203b45f3b8a926f90cfbcd365f7188d3b64ed3deb6860a8b0a9e8a448687a.exe File opened (read-only) \??\L: 836203b45f3b8a926f90cfbcd365f7188d3b64ed3deb6860a8b0a9e8a448687a.exe File opened (read-only) \??\N: 836203b45f3b8a926f90cfbcd365f7188d3b64ed3deb6860a8b0a9e8a448687a.exe File opened (read-only) \??\P: 836203b45f3b8a926f90cfbcd365f7188d3b64ed3deb6860a8b0a9e8a448687a.exe File opened (read-only) \??\R: 836203b45f3b8a926f90cfbcd365f7188d3b64ed3deb6860a8b0a9e8a448687a.exe File opened (read-only) \??\W: 836203b45f3b8a926f90cfbcd365f7188d3b64ed3deb6860a8b0a9e8a448687a.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\autorun.inf 836203b45f3b8a926f90cfbcd365f7188d3b64ed3deb6860a8b0a9e8a448687a.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 836203b45f3b8a926f90cfbcd365f7188d3b64ed3deb6860a8b0a9e8a448687a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\836203b45f3b8a926f90cfbcd365f7188d3b64ed3deb6860a8b0a9e8a448687a.exe"C:\Users\Admin\AppData\Local\Temp\836203b45f3b8a926f90cfbcd365f7188d3b64ed3deb6860a8b0a9e8a448687a.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops autorun.inf file
- System Location Discovery: System Language Discovery
PID:4588
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD565d1e0508a33a7b6a3249537ef6b7859
SHA1bcb9ebccddca462402b0b1b92e355ce86c49198a
SHA256fc82ec6b2c3db9e4c8c446c95f91ea3ac65152b8d0f604c9c40de67540fe64e7
SHA5122309d6288c617cfb363ed602449d967b37ad7c013499adb7411fc3522f728609067e42fae42f3f7b288f1113556ab56c797eff7f7141f50b6d5eaae306c0846c