Analysis
-
max time kernel
119s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2024 11:43
Static task
static1
Behavioral task
behavioral1
Sample
ad636ede6fe33a1196a5c673cf47c780N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ad636ede6fe33a1196a5c673cf47c780N.exe
Resource
win10v2004-20240802-en
General
-
Target
ad636ede6fe33a1196a5c673cf47c780N.exe
-
Size
476KB
-
MD5
ad636ede6fe33a1196a5c673cf47c780
-
SHA1
1581c82cd252da181b91bcc497a2d75da705155c
-
SHA256
683cba8eb71ef8ddda7600f75840f5c730437fcca7a49c6db2b00fe2355bb3cb
-
SHA512
a7d477da515e6757c97631294eba5f721f493181b7b7c04a4a14d360daa5c00784c5339ed3fcf8961a48b9f5729bf8b51ce9c1598073520d527fc7cfeadfd179
-
SSDEEP
3072:Jin8r+coP2W0XgEU5IuY2R8FD8edLhb9x4CuSqhAp08FkGRnNrdf45AjqKnoem:23P0KPsvKhAp081nNVjqKoe
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation ad636ede6fe33a1196a5c673cf47c780N.exe -
Executes dropped EXE 2 IoCs
pid Process 1636 JREUPD7.exe 3368 JREUPD7.exe -
resource yara_rule behavioral2/memory/4740-7-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4740-9-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4740-11-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4740-37-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4740-56-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3368-57-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JREsp7 = "C:\\Users\\Admin\\AppData\\Roaming\\SunJavaJREupdate7\\JREUPD7.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4084 set thread context of 4740 4084 ad636ede6fe33a1196a5c673cf47c780N.exe 97 PID 1636 set thread context of 3368 1636 JREUPD7.exe 104 PID 1636 set thread context of 116 1636 JREUPD7.exe 105 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3092 116 WerFault.exe 105 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad636ede6fe33a1196a5c673cf47c780N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad636ede6fe33a1196a5c673cf47c780N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JREUPD7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JREUPD7.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 3368 JREUPD7.exe Token: SeDebugPrivilege 3368 JREUPD7.exe Token: SeDebugPrivilege 3368 JREUPD7.exe Token: SeDebugPrivilege 3368 JREUPD7.exe Token: SeDebugPrivilege 3368 JREUPD7.exe Token: SeDebugPrivilege 3368 JREUPD7.exe Token: SeDebugPrivilege 3368 JREUPD7.exe Token: SeDebugPrivilege 3368 JREUPD7.exe Token: SeDebugPrivilege 3368 JREUPD7.exe Token: SeDebugPrivilege 3368 JREUPD7.exe Token: SeDebugPrivilege 3368 JREUPD7.exe Token: SeDebugPrivilege 3368 JREUPD7.exe Token: SeDebugPrivilege 3368 JREUPD7.exe Token: SeDebugPrivilege 3368 JREUPD7.exe Token: SeDebugPrivilege 3368 JREUPD7.exe Token: SeDebugPrivilege 3368 JREUPD7.exe Token: SeDebugPrivilege 3368 JREUPD7.exe Token: SeDebugPrivilege 3368 JREUPD7.exe Token: SeDebugPrivilege 3368 JREUPD7.exe Token: SeDebugPrivilege 3368 JREUPD7.exe Token: SeDebugPrivilege 3368 JREUPD7.exe Token: SeDebugPrivilege 3368 JREUPD7.exe Token: SeDebugPrivilege 3368 JREUPD7.exe Token: SeDebugPrivilege 3368 JREUPD7.exe Token: SeDebugPrivilege 3368 JREUPD7.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4084 ad636ede6fe33a1196a5c673cf47c780N.exe 4740 ad636ede6fe33a1196a5c673cf47c780N.exe 1636 JREUPD7.exe 3368 JREUPD7.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4084 wrote to memory of 4740 4084 ad636ede6fe33a1196a5c673cf47c780N.exe 97 PID 4084 wrote to memory of 4740 4084 ad636ede6fe33a1196a5c673cf47c780N.exe 97 PID 4084 wrote to memory of 4740 4084 ad636ede6fe33a1196a5c673cf47c780N.exe 97 PID 4084 wrote to memory of 4740 4084 ad636ede6fe33a1196a5c673cf47c780N.exe 97 PID 4084 wrote to memory of 4740 4084 ad636ede6fe33a1196a5c673cf47c780N.exe 97 PID 4084 wrote to memory of 4740 4084 ad636ede6fe33a1196a5c673cf47c780N.exe 97 PID 4084 wrote to memory of 4740 4084 ad636ede6fe33a1196a5c673cf47c780N.exe 97 PID 4084 wrote to memory of 4740 4084 ad636ede6fe33a1196a5c673cf47c780N.exe 97 PID 4740 wrote to memory of 1912 4740 ad636ede6fe33a1196a5c673cf47c780N.exe 98 PID 4740 wrote to memory of 1912 4740 ad636ede6fe33a1196a5c673cf47c780N.exe 98 PID 4740 wrote to memory of 1912 4740 ad636ede6fe33a1196a5c673cf47c780N.exe 98 PID 1912 wrote to memory of 3992 1912 cmd.exe 101 PID 1912 wrote to memory of 3992 1912 cmd.exe 101 PID 1912 wrote to memory of 3992 1912 cmd.exe 101 PID 4740 wrote to memory of 1636 4740 ad636ede6fe33a1196a5c673cf47c780N.exe 102 PID 4740 wrote to memory of 1636 4740 ad636ede6fe33a1196a5c673cf47c780N.exe 102 PID 4740 wrote to memory of 1636 4740 ad636ede6fe33a1196a5c673cf47c780N.exe 102 PID 1636 wrote to memory of 3368 1636 JREUPD7.exe 104 PID 1636 wrote to memory of 3368 1636 JREUPD7.exe 104 PID 1636 wrote to memory of 3368 1636 JREUPD7.exe 104 PID 1636 wrote to memory of 3368 1636 JREUPD7.exe 104 PID 1636 wrote to memory of 3368 1636 JREUPD7.exe 104 PID 1636 wrote to memory of 3368 1636 JREUPD7.exe 104 PID 1636 wrote to memory of 3368 1636 JREUPD7.exe 104 PID 1636 wrote to memory of 3368 1636 JREUPD7.exe 104 PID 1636 wrote to memory of 116 1636 JREUPD7.exe 105 PID 1636 wrote to memory of 116 1636 JREUPD7.exe 105 PID 1636 wrote to memory of 116 1636 JREUPD7.exe 105 PID 1636 wrote to memory of 116 1636 JREUPD7.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad636ede6fe33a1196a5c673cf47c780N.exe"C:\Users\Admin\AppData\Local\Temp\ad636ede6fe33a1196a5c673cf47c780N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\ad636ede6fe33a1196a5c673cf47c780N.exe"C:\Users\Admin\AppData\Local\Temp\ad636ede6fe33a1196a5c673cf47c780N.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VDRQC.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "JREsp7" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\SunJavaJREupdate7\JREUPD7.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3992
-
-
-
C:\Users\Admin\AppData\Roaming\SunJavaJREupdate7\JREUPD7.exe"C:\Users\Admin\AppData\Roaming\SunJavaJREupdate7\JREUPD7.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Roaming\SunJavaJREupdate7\JREUPD7.exe"C:\Users\Admin\AppData\Roaming\SunJavaJREupdate7\JREUPD7.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3368
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"4⤵PID:116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 116 -s 845⤵
- Program crash
PID:3092
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 116 -ip 1161⤵PID:844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5a5ab6d6b7f03c59f02ebde6e2834fe42
SHA1567e8e08dcb41c365116e5806676d89e2b9f522a
SHA2562dfac769e0e863a3f534444566bbc908edb7fed1981feed55a8f402cc7a3e506
SHA512271f94ed4f69eb40012e26aae164a0332bc3695d08f119e82096a4a14e15631e8a6ee7c8095d047ba5e2ae03e364c010b873a5f3191ab88a835ae2227ddc30bd
-
Filesize
476KB
MD56e055dd75f7627629476208fb4ba7a90
SHA1302428d745e1ae697901d14ba163a02204cbcb0e
SHA25621628cbcf41c552a1e62cc4b4776338be8b2a58f162f5e3b20bf567270d849e2
SHA512b952310ccc72b4c55fe6d0a9417e2e82b7ebede8943cb4b51a3b7581beca0798c744697173ffc5c24abb6393739ff202e1024e08e47df0ab5c56efeeb4024d27