Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 11:43
Static task
static1
Behavioral task
behavioral1
Sample
ad636ede6fe33a1196a5c673cf47c780N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ad636ede6fe33a1196a5c673cf47c780N.exe
Resource
win10v2004-20240802-en
General
-
Target
ad636ede6fe33a1196a5c673cf47c780N.exe
-
Size
476KB
-
MD5
ad636ede6fe33a1196a5c673cf47c780
-
SHA1
1581c82cd252da181b91bcc497a2d75da705155c
-
SHA256
683cba8eb71ef8ddda7600f75840f5c730437fcca7a49c6db2b00fe2355bb3cb
-
SHA512
a7d477da515e6757c97631294eba5f721f493181b7b7c04a4a14d360daa5c00784c5339ed3fcf8961a48b9f5729bf8b51ce9c1598073520d527fc7cfeadfd179
-
SSDEEP
3072:Jin8r+coP2W0XgEU5IuY2R8FD8edLhb9x4CuSqhAp08FkGRnNrdf45AjqKnoem:23P0KPsvKhAp081nNVjqKoe
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 11536 JREUPD7.exe 53756 JREUPD7.exe -
Loads dropped DLL 5 IoCs
pid Process 11328 ad636ede6fe33a1196a5c673cf47c780N.exe 11328 ad636ede6fe33a1196a5c673cf47c780N.exe 11328 ad636ede6fe33a1196a5c673cf47c780N.exe 11328 ad636ede6fe33a1196a5c673cf47c780N.exe 11328 ad636ede6fe33a1196a5c673cf47c780N.exe -
resource yara_rule behavioral1/memory/11328-26758-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/11328-26756-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/11328-26755-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/11328-26752-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/11328-26750-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/11328-26801-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/11328-53535-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/53756-53539-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Run\JREsp7 = "C:\\Users\\Admin\\AppData\\Roaming\\SunJavaJREupdate7\\JREUPD7.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2052 set thread context of 11328 2052 ad636ede6fe33a1196a5c673cf47c780N.exe 29 PID 11536 set thread context of 53756 11536 JREUPD7.exe 34 PID 11536 set thread context of 53928 11536 JREUPD7.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JREUPD7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JREUPD7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad636ede6fe33a1196a5c673cf47c780N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad636ede6fe33a1196a5c673cf47c780N.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 53756 JREUPD7.exe Token: SeDebugPrivilege 53756 JREUPD7.exe Token: SeDebugPrivilege 53756 JREUPD7.exe Token: SeDebugPrivilege 53756 JREUPD7.exe Token: SeDebugPrivilege 53756 JREUPD7.exe Token: SeDebugPrivilege 53756 JREUPD7.exe Token: SeDebugPrivilege 53756 JREUPD7.exe Token: SeDebugPrivilege 53756 JREUPD7.exe Token: SeDebugPrivilege 53756 JREUPD7.exe Token: SeDebugPrivilege 53756 JREUPD7.exe Token: SeDebugPrivilege 53756 JREUPD7.exe Token: SeDebugPrivilege 53756 JREUPD7.exe Token: SeDebugPrivilege 53756 JREUPD7.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2052 ad636ede6fe33a1196a5c673cf47c780N.exe 11328 ad636ede6fe33a1196a5c673cf47c780N.exe 11536 JREUPD7.exe 53756 JREUPD7.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2052 wrote to memory of 11328 2052 ad636ede6fe33a1196a5c673cf47c780N.exe 29 PID 2052 wrote to memory of 11328 2052 ad636ede6fe33a1196a5c673cf47c780N.exe 29 PID 2052 wrote to memory of 11328 2052 ad636ede6fe33a1196a5c673cf47c780N.exe 29 PID 2052 wrote to memory of 11328 2052 ad636ede6fe33a1196a5c673cf47c780N.exe 29 PID 2052 wrote to memory of 11328 2052 ad636ede6fe33a1196a5c673cf47c780N.exe 29 PID 2052 wrote to memory of 11328 2052 ad636ede6fe33a1196a5c673cf47c780N.exe 29 PID 2052 wrote to memory of 11328 2052 ad636ede6fe33a1196a5c673cf47c780N.exe 29 PID 2052 wrote to memory of 11328 2052 ad636ede6fe33a1196a5c673cf47c780N.exe 29 PID 11328 wrote to memory of 11456 11328 ad636ede6fe33a1196a5c673cf47c780N.exe 30 PID 11328 wrote to memory of 11456 11328 ad636ede6fe33a1196a5c673cf47c780N.exe 30 PID 11328 wrote to memory of 11456 11328 ad636ede6fe33a1196a5c673cf47c780N.exe 30 PID 11328 wrote to memory of 11456 11328 ad636ede6fe33a1196a5c673cf47c780N.exe 30 PID 11456 wrote to memory of 11512 11456 cmd.exe 32 PID 11456 wrote to memory of 11512 11456 cmd.exe 32 PID 11456 wrote to memory of 11512 11456 cmd.exe 32 PID 11456 wrote to memory of 11512 11456 cmd.exe 32 PID 11328 wrote to memory of 11536 11328 ad636ede6fe33a1196a5c673cf47c780N.exe 33 PID 11328 wrote to memory of 11536 11328 ad636ede6fe33a1196a5c673cf47c780N.exe 33 PID 11328 wrote to memory of 11536 11328 ad636ede6fe33a1196a5c673cf47c780N.exe 33 PID 11328 wrote to memory of 11536 11328 ad636ede6fe33a1196a5c673cf47c780N.exe 33 PID 11536 wrote to memory of 53756 11536 JREUPD7.exe 34 PID 11536 wrote to memory of 53756 11536 JREUPD7.exe 34 PID 11536 wrote to memory of 53756 11536 JREUPD7.exe 34 PID 11536 wrote to memory of 53756 11536 JREUPD7.exe 34 PID 11536 wrote to memory of 53756 11536 JREUPD7.exe 34 PID 11536 wrote to memory of 53756 11536 JREUPD7.exe 34 PID 11536 wrote to memory of 53756 11536 JREUPD7.exe 34 PID 11536 wrote to memory of 53756 11536 JREUPD7.exe 34 PID 11536 wrote to memory of 53928 11536 JREUPD7.exe 35 PID 11536 wrote to memory of 53928 11536 JREUPD7.exe 35 PID 11536 wrote to memory of 53928 11536 JREUPD7.exe 35 PID 11536 wrote to memory of 53928 11536 JREUPD7.exe 35 PID 11536 wrote to memory of 53928 11536 JREUPD7.exe 35 PID 11536 wrote to memory of 53928 11536 JREUPD7.exe 35 PID 11536 wrote to memory of 53928 11536 JREUPD7.exe 35 PID 11536 wrote to memory of 53928 11536 JREUPD7.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad636ede6fe33a1196a5c673cf47c780N.exe"C:\Users\Admin\AppData\Local\Temp\ad636ede6fe33a1196a5c673cf47c780N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\ad636ede6fe33a1196a5c673cf47c780N.exe"C:\Users\Admin\AppData\Local\Temp\ad636ede6fe33a1196a5c673cf47c780N.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:11328 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\FKXGH.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:11456 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "JREsp7" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\SunJavaJREupdate7\JREUPD7.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:11512
-
-
-
C:\Users\Admin\AppData\Roaming\SunJavaJREupdate7\JREUPD7.exe"C:\Users\Admin\AppData\Roaming\SunJavaJREupdate7\JREUPD7.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:11536 -
C:\Users\Admin\AppData\Roaming\SunJavaJREupdate7\JREUPD7.exe"C:\Users\Admin\AppData\Roaming\SunJavaJREupdate7\JREUPD7.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:53756
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"4⤵PID:53928
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5a5ab6d6b7f03c59f02ebde6e2834fe42
SHA1567e8e08dcb41c365116e5806676d89e2b9f522a
SHA2562dfac769e0e863a3f534444566bbc908edb7fed1981feed55a8f402cc7a3e506
SHA512271f94ed4f69eb40012e26aae164a0332bc3695d08f119e82096a4a14e15631e8a6ee7c8095d047ba5e2ae03e364c010b873a5f3191ab88a835ae2227ddc30bd
-
Filesize
476KB
MD5b6596ec7a87e76d17af71d0c2dfd528f
SHA12e6bae56ecdbafd15653167a0348660e147e5d11
SHA25617a2471444be7b026ed9de4696079881ccad3ae1ee9e7c95a20c20e33300292c
SHA5121d383fdc2c5224787b2b0840fce472345ee21c1fdd129696ad7935da6e3ae3a294ac48ba5d4d64e2812e7b8685f9a5b39039cb9364e8cf4ebcdf83c5afa8f049