Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 18:41
Static task
static1
Behavioral task
behavioral1
Sample
J74N3UGkQRFbJPTK.exe
Resource
win7-20241010-en
General
-
Target
J74N3UGkQRFbJPTK.exe
-
Size
8.2MB
-
MD5
e0cf4901b5fe2a17af5a369e7faeab1b
-
SHA1
2d71a612c66a267d71f39769b2ab3d7e99035764
-
SHA256
66cfe98bdab5ba7bc9642ae084b708deb928d4688b9bc577c5add8b021cbcafe
-
SHA512
22dbf9e1d71822ffd6c5505a2eeffb46fbf75d5e5cec9fba619ccf78100ec9a5f6063fafce1f07bcdae3eeb8ec0732661ba15fca7bf57bb08d0943b1d0512df6
-
SSDEEP
196608:sfU3F+AqdanoW6dyebDOuKMXRlbO0OeRzM1Hyq:8qFovIebSDwyeZMpX
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
J74N3UGkQRFbJPTK.exeVirtual.exeVirtual.exepid process 2832 J74N3UGkQRFbJPTK.exe 2616 Virtual.exe 2688 Virtual.exe -
Loads dropped DLL 15 IoCs
Processes:
J74N3UGkQRFbJPTK.exeJ74N3UGkQRFbJPTK.exeVirtual.exeVirtual.execmd.exepid process 2484 J74N3UGkQRFbJPTK.exe 2832 J74N3UGkQRFbJPTK.exe 2832 J74N3UGkQRFbJPTK.exe 2832 J74N3UGkQRFbJPTK.exe 2616 Virtual.exe 2616 Virtual.exe 2616 Virtual.exe 2616 Virtual.exe 2616 Virtual.exe 2616 Virtual.exe 2688 Virtual.exe 2688 Virtual.exe 2688 Virtual.exe 2688 Virtual.exe 3032 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Virtual.exedescription pid process target process PID 2688 set thread context of 3032 2688 Virtual.exe cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
J74N3UGkQRFbJPTK.exeJ74N3UGkQRFbJPTK.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language J74N3UGkQRFbJPTK.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language J74N3UGkQRFbJPTK.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
Virtual.exeVirtual.execmd.exepid process 2616 Virtual.exe 2688 Virtual.exe 2688 Virtual.exe 3032 cmd.exe 3032 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
Virtual.execmd.exepid process 2688 Virtual.exe 3032 cmd.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
J74N3UGkQRFbJPTK.exeJ74N3UGkQRFbJPTK.exeVirtual.exeVirtual.execmd.exedescription pid process target process PID 2484 wrote to memory of 2832 2484 J74N3UGkQRFbJPTK.exe J74N3UGkQRFbJPTK.exe PID 2484 wrote to memory of 2832 2484 J74N3UGkQRFbJPTK.exe J74N3UGkQRFbJPTK.exe PID 2484 wrote to memory of 2832 2484 J74N3UGkQRFbJPTK.exe J74N3UGkQRFbJPTK.exe PID 2484 wrote to memory of 2832 2484 J74N3UGkQRFbJPTK.exe J74N3UGkQRFbJPTK.exe PID 2484 wrote to memory of 2832 2484 J74N3UGkQRFbJPTK.exe J74N3UGkQRFbJPTK.exe PID 2484 wrote to memory of 2832 2484 J74N3UGkQRFbJPTK.exe J74N3UGkQRFbJPTK.exe PID 2484 wrote to memory of 2832 2484 J74N3UGkQRFbJPTK.exe J74N3UGkQRFbJPTK.exe PID 2832 wrote to memory of 2616 2832 J74N3UGkQRFbJPTK.exe Virtual.exe PID 2832 wrote to memory of 2616 2832 J74N3UGkQRFbJPTK.exe Virtual.exe PID 2832 wrote to memory of 2616 2832 J74N3UGkQRFbJPTK.exe Virtual.exe PID 2832 wrote to memory of 2616 2832 J74N3UGkQRFbJPTK.exe Virtual.exe PID 2616 wrote to memory of 2688 2616 Virtual.exe Virtual.exe PID 2616 wrote to memory of 2688 2616 Virtual.exe Virtual.exe PID 2616 wrote to memory of 2688 2616 Virtual.exe Virtual.exe PID 2688 wrote to memory of 3032 2688 Virtual.exe cmd.exe PID 2688 wrote to memory of 3032 2688 Virtual.exe cmd.exe PID 2688 wrote to memory of 3032 2688 Virtual.exe cmd.exe PID 2688 wrote to memory of 3032 2688 Virtual.exe cmd.exe PID 2688 wrote to memory of 3032 2688 Virtual.exe cmd.exe PID 3032 wrote to memory of 1152 3032 cmd.exe MSBuild.exe PID 3032 wrote to memory of 1152 3032 cmd.exe MSBuild.exe PID 3032 wrote to memory of 1152 3032 cmd.exe MSBuild.exe PID 3032 wrote to memory of 1152 3032 cmd.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\J74N3UGkQRFbJPTK.exe"C:\Users\Admin\AppData\Local\Temp\J74N3UGkQRFbJPTK.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\Temp\{0F42DC84-E926-4E53-AA12-209E232A53A5}\.cr\J74N3UGkQRFbJPTK.exe"C:\Windows\Temp\{0F42DC84-E926-4E53-AA12-209E232A53A5}\.cr\J74N3UGkQRFbJPTK.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\J74N3UGkQRFbJPTK.exe" -burn.filehandle.attached=180 -burn.filehandle.self=1882⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\Temp\{CD7ABC37-AB4B-4690-A09E-BB0CDDA6279A}\.ba\Virtual.exe"C:\Windows\Temp\{CD7ABC37-AB4B-4690-A09E-BB0CDDA6279A}\.ba\Virtual.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Roaming\Hfdriverv4\Virtual.exeC:\Users\Admin\AppData\Roaming\Hfdriverv4\Virtual.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe6⤵PID:1152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD53af35a2e007583df8310397cadf09997
SHA11ade90ceb6bf299d3b487cdaacd0a0e6993f594e
SHA256f8d37e9ac992d14b40fabe49086a966054465c7d66f4b70b8434f5e4871b604f
SHA5123b5d9a99a7c224a167e15e663069e5342f392dda73ad2c9fa0ec84a8e7f5c17c45fc3b354de16f9cbefdf2dd3c482bae8c1461c12e3615b775370713e59d30c0
-
Filesize
93KB
MD56c278a8759cc3d2c20cb31b96cceffba
SHA1c0a1f3a3e98b004f298f7fab69a7e0b2c3230390
SHA256e37be4d4567d1bf3efd9a0e72522440e9971c2f73e162a831d163ae0abd0bba3
SHA5126ddeebff2f0b81a0c571d54d3941b9a768fab9e5e9117f134291a17cb3fda6cd892b72b5803b7ca9b9b120e63b31794243c1e0337da815affd558905fe6dc406
-
Filesize
2.8MB
MD54546983da706b1d902369838e3e025e8
SHA1c1204dd491fe9cd8f66acb2e88168cf7aa8cf833
SHA256a74d5f8def4628a3fd1cec46962b01d968a3ebd9621b293c5a314d97ca86b479
SHA5123181519bcf5b7b0bb9572b48b2751743d83ba971e917859224bc4e0366ef6af926ebf9c353dce653c88f746a93fc16b1e0328747e9aa448f00e08ac93620062b
-
Filesize
8.1MB
MD529d068479a2ed134b1c00f910b739a6e
SHA1b6586ad295c40df90bb2da169519cf2f01769dff
SHA256914b4f330d93a980d9caa1258b862a0e6284a4c4876033d06ac0076a3180298c
SHA512ac76f743a4ce42ea2018b5af64d7e5886a23441dc808a191e0194574ebd3daf689341b3df6ed05d4e74751d1574194b7a528c39dbaa8e380767815815aa53294
-
Filesize
3.3MB
MD5ce0fa57391d0a30d8d4d4267cf7fc62a
SHA13d142ecb01fd9dd29eefb8608605435dab4f7e51
SHA256425227a0b060a31b3f726f9fc5d3b5a3bd9739ba64204982a61204021424345e
SHA512b83ee72ff13000cc05da27db20683f17fa1e412ee30abd5bdc920ff2146aaff45d4104d0dffd169be1afbecf58bdc76c5fd9ba6a6c498e1ea348f7686bc0f895
-
Filesize
371KB
MD5496df6ad1a158ed5037138e397713ef0
SHA1287bd2219c955687baa399ded57e9ab64334c63c
SHA25607c04290f53aaaaa7df6b6ea3a53103b6e3ef8ff658d8097617a9c48dfc6e90a
SHA512422da26a8f50c1f02c1cc7c4bed37cdb33732039bba82f32c2a14baa8c6a7bc5544856ab26a2071b5ea8e731a296e2c69071da2f067312d05763aa3a9928bb3a
-
Filesize
4.1MB
MD554adad2532884cee2c8e6a085e5db58e
SHA1f5e4d7ba3684a996f7bdeec53b66be035317c0f1
SHA2563cff6c4268e1b10dfc740d30b14387a82f572000b30e3207984926ebd31bae5d
SHA51232eba26f93627476011cedcfeb3070ced698f95826f1d076d5e9b210ea10c81cb15212c3293a618364dce75904ed8af4b3cc14dccf2cedc94b307637ddd59843
-
Filesize
3.4MB
MD5c8a2de7077f97d4bce1a44317b49ef41
SHA16cb3212ec9be08cb5a29bf8d37e9ca845efc18c9
SHA256448402c129a721812fa1c5f279f5ca906b9c8bbca652a91655d144d20ce5e6b4
SHA5129815eba1566a8e33734f6a218071ec501dd1f799b1535e25d87c2b416b928ae8d15f8218cf20e685f9907ec39c202cbfc4728fe6ab9d87b3de345109f626845e
-
Filesize
593KB
MD5d029339c0f59cf662094eddf8c42b2b5
SHA1a0b6de44255ce7bfade9a5b559dd04f2972bfdc8
SHA256934d882efd3c0f3f1efbc238ef87708f3879f5bb456d30af62f3368d58b6aa4c
SHA512021d9af52e68cb7a3b0042d9ed6c9418552ee16df966f9ccedd458567c47d70471cb8851a69d3982d64571369664faeeae3be90e2e88a909005b9cdb73679c82
-
Filesize
809KB
MD5366fd6f3a451351b5df2d7c4ecf4c73a
SHA150db750522b9630757f91b53df377fd4ed4e2d66
SHA256ae3cb6c6afba9a4aa5c85f66023c35338ca579b30326dd02918f9d55259503d5
SHA5122de764772b68a85204b7435c87e9409d753c2196cf5b2f46e7796c99a33943e167f62a92e8753eaa184cd81fb14361e83228eb1b474e0c3349ed387ec93e6130