Analysis
-
max time kernel
91s -
max time network
95s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
21/09/2024, 21:31
Static task
static1
Behavioral task
behavioral1
Sample
66e705d09b33c_jack.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
66e705d09b33c_jack.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
66e705d09b33c_jack.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
66e705d09b33c_jack.exe
Resource
win11-20240802-en
General
-
Target
66e705d09b33c_jack.exe
-
Size
4.1MB
-
MD5
abdbcc23bd8f767e671bac6d2ff60335
-
SHA1
18ca867c0502b353e9aad63553efd4eb4e25723f
-
SHA256
45a7b861baac5f8234433fefd9dbdd0a5f288a18b72346b6b6917cf56882bf85
-
SHA512
67c00713e6d24d192c0f8e3e49fa146418faf72b2bb42c276ad560f08e39c68f4ab446c47c7e7710778aee9ca1f193ad65e061645b6bcec414844165b5e16bc7
-
SSDEEP
49152:HYcdjDQdrscIC5SmTT+mfkj8J6iKG7suEAeMDsaUmxb7WnpRGnKuAsF33PKQTunw:HK/f+mfNptIZ/alxGR7uA8Phanzuhjf
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PowerExpertNNT.lnk 66e705d09b33c_jack.exe -
Executes dropped EXE 3 IoCs
pid Process 1148 66e705d09b33c_jack.exe 3900 66e705d09b33c_jack.exe 4520 66e705d09b33c_jack.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000\Software\Microsoft\Windows\CurrentVersion\Run\ExtreamFanV6 = "C:\\Users\\Admin\\AppData\\Local\\ExtreamFanV6\\ExtreamFanV6.exe" 66e705d09b33c_jack.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 784 set thread context of 3168 784 66e705d09b33c_jack.exe 79 PID 1148 set thread context of 4520 1148 66e705d09b33c_jack.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66e705d09b33c_jack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66e705d09b33c_jack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66e705d09b33c_jack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66e705d09b33c_jack.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3184 schtasks.exe 4632 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1148 66e705d09b33c_jack.exe 1148 66e705d09b33c_jack.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3168 66e705d09b33c_jack.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 784 66e705d09b33c_jack.exe Token: SeDebugPrivilege 1148 66e705d09b33c_jack.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 784 wrote to memory of 3168 784 66e705d09b33c_jack.exe 79 PID 784 wrote to memory of 3168 784 66e705d09b33c_jack.exe 79 PID 784 wrote to memory of 3168 784 66e705d09b33c_jack.exe 79 PID 784 wrote to memory of 3168 784 66e705d09b33c_jack.exe 79 PID 784 wrote to memory of 3168 784 66e705d09b33c_jack.exe 79 PID 784 wrote to memory of 3168 784 66e705d09b33c_jack.exe 79 PID 784 wrote to memory of 3168 784 66e705d09b33c_jack.exe 79 PID 784 wrote to memory of 3168 784 66e705d09b33c_jack.exe 79 PID 784 wrote to memory of 3168 784 66e705d09b33c_jack.exe 79 PID 784 wrote to memory of 3168 784 66e705d09b33c_jack.exe 79 PID 3168 wrote to memory of 3184 3168 66e705d09b33c_jack.exe 80 PID 3168 wrote to memory of 3184 3168 66e705d09b33c_jack.exe 80 PID 3168 wrote to memory of 3184 3168 66e705d09b33c_jack.exe 80 PID 3168 wrote to memory of 4632 3168 66e705d09b33c_jack.exe 82 PID 3168 wrote to memory of 4632 3168 66e705d09b33c_jack.exe 82 PID 3168 wrote to memory of 4632 3168 66e705d09b33c_jack.exe 82 PID 3168 wrote to memory of 1148 3168 66e705d09b33c_jack.exe 84 PID 3168 wrote to memory of 1148 3168 66e705d09b33c_jack.exe 84 PID 3168 wrote to memory of 1148 3168 66e705d09b33c_jack.exe 84 PID 1148 wrote to memory of 3900 1148 66e705d09b33c_jack.exe 85 PID 1148 wrote to memory of 3900 1148 66e705d09b33c_jack.exe 85 PID 1148 wrote to memory of 3900 1148 66e705d09b33c_jack.exe 85 PID 1148 wrote to memory of 4520 1148 66e705d09b33c_jack.exe 86 PID 1148 wrote to memory of 4520 1148 66e705d09b33c_jack.exe 86 PID 1148 wrote to memory of 4520 1148 66e705d09b33c_jack.exe 86 PID 1148 wrote to memory of 4520 1148 66e705d09b33c_jack.exe 86 PID 1148 wrote to memory of 4520 1148 66e705d09b33c_jack.exe 86 PID 1148 wrote to memory of 4520 1148 66e705d09b33c_jack.exe 86 PID 1148 wrote to memory of 4520 1148 66e705d09b33c_jack.exe 86 PID 1148 wrote to memory of 4520 1148 66e705d09b33c_jack.exe 86 PID 1148 wrote to memory of 4520 1148 66e705d09b33c_jack.exe 86 PID 1148 wrote to memory of 4520 1148 66e705d09b33c_jack.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\66e705d09b33c_jack.exe"C:\Users\Admin\AppData\Local\Temp\66e705d09b33c_jack.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Users\Admin\AppData\Local\Temp\66e705d09b33c_jack.exe"C:\Users\Admin\AppData\Local\Temp\66e705d09b33c_jack.exe"2⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\jewkkwnf\jewkkwnf.exe" /tn "jewkkwnf HR" /sc HOURLY /rl HIGHEST3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3184
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\jewkkwnf\jewkkwnf.exe" /tn "jewkkwnf LG" /sc ONLOGON /rl HIGHEST3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4632
-
-
C:\Users\Admin\AppData\Local\Temp\66e705d09b33c_jack.exe"C:\Users\Admin\AppData\Local\Temp\66e705d09b33c_jack.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\66e705d09b33c_jack.exe"C:\Users\Admin\AppData\Local\Temp\66e705d09b33c_jack.exe"4⤵
- Executes dropped EXE
PID:3900
-
-
C:\Users\Admin\AppData\Local\Temp\66e705d09b33c_jack.exe"C:\Users\Admin\AppData\Local\Temp\66e705d09b33c_jack.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4520
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.1MB
MD5abdbcc23bd8f767e671bac6d2ff60335
SHA118ca867c0502b353e9aad63553efd4eb4e25723f
SHA25645a7b861baac5f8234433fefd9dbdd0a5f288a18b72346b6b6917cf56882bf85
SHA51267c00713e6d24d192c0f8e3e49fa146418faf72b2bb42c276ad560f08e39c68f4ab446c47c7e7710778aee9ca1f193ad65e061645b6bcec414844165b5e16bc7
-
Filesize
617B
MD5c66cf802a892edafbc83ff0079efbd11
SHA1872238b3ee0a9386a9fd634efd6e09668984fa6b
SHA2564ab646f8bf5623ebac140b0b649eae85c7e864866013151d56ce996d96d64153
SHA512e44b332728209d34691db8618acceacdc3366769abd8f96370e9de4e684e062e426591f9ff1dc086203db2bd0a812aff1038211638899e8b078b0819badd0708
-
Filesize
1.0MB
MD58c8af20bf6536903c1d042cebede6475
SHA18ef42abc3ad478f6d8c17691fe4cc1975ca43684
SHA256b15bdb0a4d7f265cf4ed7c46668f4ca247347ca2ce4a7689cb8dbb25863f294a
SHA5128f68e5302d07fb74dde0e42e0d370e1cb7c1d6b0372633fcfaab95cd1d12f9786c4e44e71b3cc98eeeb60ea10f54497773c3b4aa58afa5297fad93a3f11097e0
-
Filesize
1KB
MD56da5ed85c5a209798c4858eb1f5d6f33
SHA19e74b41a8914df9fbd4bf45224b4dafa58da69a8
SHA25647b904e2a84e28c938bbb8554ba7e9ff377a0017d5c3d5917bf2fd41b10ab82d
SHA512ca4c3b2015c3fb8db459cda09250d502cdf392480f0820c39929833f190553fc84a997c30d1071c1a14ad28cbe4d426356b6c60d9a56ccac6c13b1f16e1ea7c4