Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15-08-2024 12:52
Static task
static1
Behavioral task
behavioral1
Sample
jpG.exe
Resource
win7-20240704-en
General
-
Target
jpG.exe
-
Size
1.1MB
-
MD5
6db162a5cd29432c1922968c38d61b52
-
SHA1
fef1f9828625cd773356a8026ba8db98ce2dff5a
-
SHA256
0d19f3e45d3a107d0b326b3c2aa3a6cc0c8878c6424a523483408db0c196eab0
-
SHA512
6ddcc696ae22be74197650708e1709ff45092d5549bacc159808b00f3ff409770ce7ea3438b9e7a59735a37d0281265073cc0d51d60a16809d695611d18494de
-
SSDEEP
12288:LdD/HflxQZY976WkB5k86o6NYIBF0REAcJTlcB74mobf+0CxYoQJ74:LtHfKK76WZ86oymxcJTqB72bf5CpM74
Malware Config
Extracted
formbook
4.1
kmge
jia0752d.com
cq0jt.sbs
whimsicalweddingrentals.com
meetsex-here.life
hhe-crv220.com
bedbillionaire.com
soycmo.com
mrawkward.xyz
11ramshornroad.com
motoyonaturals.com
thischicloves.com
gacorbet.pro
ihsanid.com
pancaketurner.com
santanarstore.com
cr3dtv.com
negotools.com
landfillequip.com
sejasuapropriachefe.com
diamant-verkopen.store
builtonmybrother.art
teoti.beauty
kickssoccercamp.com
chickfrau.com
compare-energy.com
icvp5o.xyz
susan-writes.com
dropletcoin.com
sivertool.com
sup-25987659.com
weedz-seeds.today
agritamaperkasaindonesia.com
safwankhalil.com
jm2s8a3mz.com
wfjwjm.com
be-heatpumps.life
hcwoodpanel.com
n5l780.com
mandalah.art
szexvideokingyen.sbs
justinroemmick.com
thecoolkidsdontfitin.com
gsolartech.com
swisswearables.com
chicagocarpetcleaneril.com
terrazahills-cbre.com
santatainha.com
sacksmantenimiento.store
wzhem.rest
shearwaterpembrokeshire.com
baansantiburi.com
mid-size-suv-87652.com
solunchina.com
nandos.moe
blucretebistro.com
identificatiekvk.digital
8772876.com
longfangyun.com
litblacklit.com
mobilferrari.com
zeeedajewelermusic.com
allenbach.swiss
industrialrevolution.ink
cmgamingtrack.com
a2zglobalimports.com
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" jpG.exe -
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2788-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2920 powershell.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" jpG.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA jpG.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2092 set thread context of 2788 2092 jpG.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2920 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2920 powershell.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2920 2092 jpG.exe 31 PID 2092 wrote to memory of 2920 2092 jpG.exe 31 PID 2092 wrote to memory of 2920 2092 jpG.exe 31 PID 2092 wrote to memory of 2608 2092 jpG.exe 33 PID 2092 wrote to memory of 2608 2092 jpG.exe 33 PID 2092 wrote to memory of 2608 2092 jpG.exe 33 PID 2092 wrote to memory of 2608 2092 jpG.exe 33 PID 2092 wrote to memory of 2788 2092 jpG.exe 34 PID 2092 wrote to memory of 2788 2092 jpG.exe 34 PID 2092 wrote to memory of 2788 2092 jpG.exe 34 PID 2092 wrote to memory of 2788 2092 jpG.exe 34 PID 2092 wrote to memory of 2788 2092 jpG.exe 34 PID 2092 wrote to memory of 2788 2092 jpG.exe 34 PID 2092 wrote to memory of 2788 2092 jpG.exe 34 PID 2092 wrote to memory of 2624 2092 jpG.exe 35 PID 2092 wrote to memory of 2624 2092 jpG.exe 35 PID 2092 wrote to memory of 2624 2092 jpG.exe 35 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" jpG.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\jpG.exe"C:\Users\Admin\AppData\Local\Temp\jpG.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2092 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\jpG.exe" -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2920
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"2⤵PID:2608
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"2⤵PID:2788
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2092 -s 7882⤵PID:2624
-