Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    31-10-2024 08:25

General

  • Target

    2024-10-31_5c75deeae8b11c6d2318c313673ed114_hijackloader_jeefo_magniber.exe

  • Size

    1.8MB

  • MD5

    5c75deeae8b11c6d2318c313673ed114

  • SHA1

    5cb92d1966405a46d6f272ef5a8395ea0ad0f6a1

  • SHA256

    2ef3fa41128486d6759bbfc29a65c12e1417c2b19624c31f326d1a6d6e89b7ac

  • SHA512

    e444fe7070a6e699a5ebe6ae87c442b28d8cf4f1ebb03d684a863a202d7bf1a8e678c4b708faf665749f49f2c2c3de89c696398574e3b9d2db68887f7d216a40

  • SSDEEP

    49152:DRPGoEzlgpp7oNB89z0lDyLYMCFI3BCYNIjPkCgbak:DRPjER/bI3BCGzik

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-31_5c75deeae8b11c6d2318c313673ed114_hijackloader_jeefo_magniber.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-31_5c75deeae8b11c6d2318c313673ed114_hijackloader_jeefo_magniber.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Windows\svchost.exe
      "C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\2024-10-31_5c75deeae8b11c6d2318c313673ed114_hijackloader_jeefo_magniber.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2684
      • C:\Users\Admin\AppData\Local\Temp\2024-10-31_5c75deeae8b11c6d2318c313673ed114_hijackloader_jeefo_magniber.exe
        "C:\Users\Admin\AppData\Local\Temp\2024-10-31_5c75deeae8b11c6d2318c313673ed114_hijackloader_jeefo_magniber.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2148
  • C:\Windows\svchost.exe
    C:\Windows\svchost.exe
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    PID:1012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\svchost.exe

    Filesize

    35KB

    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

  • \Users\Admin\AppData\Local\Temp\2024-10-31_5c75deeae8b11c6d2318c313673ed114_hijackloader_jeefo_magniber.exe

    Filesize

    1.7MB

    MD5

    e6f5789292d0ebc67109070235bcf085

    SHA1

    cf3cadf0b494ad4f127c33b438855d1797600365

    SHA256

    820fc4ecc75b03bb09c52f51180accc4125b5d974533b5c7c0bf5c63beef6df1

    SHA512

    3d16377d9e10d09a23a4fc607b9648860059e899192c142ad120efa63cb7dbe82227eff77748b18c97739ec9b2f15fd6b95733c5f6908931600dd6d44d71b4d0

  • memory/1012-19-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/1728-6-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2148-14-0x00000000000A0000-0x00000000000A1000-memory.dmp

    Filesize

    4KB

  • memory/2684-16-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB