Analysis
-
max time kernel
119s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2024, 18:38
Static task
static1
Behavioral task
behavioral1
Sample
b7e807aed17c799c9b49df3da742aa3dfbae077c090c3ea0c0b5d8abe4de081b.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
b7e807aed17c799c9b49df3da742aa3dfbae077c090c3ea0c0b5d8abe4de081b.exe
Resource
win10v2004-20241007-en
General
-
Target
b7e807aed17c799c9b49df3da742aa3dfbae077c090c3ea0c0b5d8abe4de081b.exe
-
Size
304KB
-
MD5
2d401987cfffde6bd6ba0901876ca1a5
-
SHA1
609ca473a5e1e3763984ee5c592d136c2f1e4c92
-
SHA256
b7e807aed17c799c9b49df3da742aa3dfbae077c090c3ea0c0b5d8abe4de081b
-
SHA512
ca8257d236b7e52677145343bbde7d9eba8cf4d076e214a881affd4feacd50e67810a6c6c2038588f0f0c5d459ac9e68f36361c52553912d2192103007ec13d3
-
SSDEEP
3072:sPGOaEaAaTG0kZSmA2m/xqc+TjGHMop2aEaLFra+7pvPSvB9G:J4AdJI6HylaRSm
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" b7e807aed17c799c9b49df3da742aa3dfbae077c090c3ea0c0b5d8abe4de081b.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jioeya.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation b7e807aed17c799c9b49df3da742aa3dfbae077c090c3ea0c0b5d8abe4de081b.exe -
Executes dropped EXE 1 IoCs
pid Process 1504 jioeya.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jioeya = "C:\\Users\\Admin\\jioeya.exe /m" jioeya.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jioeya = "C:\\Users\\Admin\\jioeya.exe /o" jioeya.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jioeya = "C:\\Users\\Admin\\jioeya.exe /i" jioeya.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jioeya = "C:\\Users\\Admin\\jioeya.exe /h" jioeya.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jioeya = "C:\\Users\\Admin\\jioeya.exe /p" jioeya.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jioeya = "C:\\Users\\Admin\\jioeya.exe /k" jioeya.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jioeya = "C:\\Users\\Admin\\jioeya.exe /w" jioeya.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jioeya = "C:\\Users\\Admin\\jioeya.exe /t" jioeya.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jioeya = "C:\\Users\\Admin\\jioeya.exe /z" jioeya.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jioeya = "C:\\Users\\Admin\\jioeya.exe /n" jioeya.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jioeya = "C:\\Users\\Admin\\jioeya.exe /c" jioeya.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jioeya = "C:\\Users\\Admin\\jioeya.exe /l" jioeya.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jioeya = "C:\\Users\\Admin\\jioeya.exe /q" jioeya.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jioeya = "C:\\Users\\Admin\\jioeya.exe /r" jioeya.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jioeya = "C:\\Users\\Admin\\jioeya.exe /v" jioeya.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jioeya = "C:\\Users\\Admin\\jioeya.exe /a" jioeya.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jioeya = "C:\\Users\\Admin\\jioeya.exe /b" jioeya.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jioeya = "C:\\Users\\Admin\\jioeya.exe /f" jioeya.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jioeya = "C:\\Users\\Admin\\jioeya.exe /j" jioeya.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jioeya = "C:\\Users\\Admin\\jioeya.exe /u" jioeya.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jioeya = "C:\\Users\\Admin\\jioeya.exe /g" jioeya.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jioeya = "C:\\Users\\Admin\\jioeya.exe /s" jioeya.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jioeya = "C:\\Users\\Admin\\jioeya.exe /e" jioeya.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jioeya = "C:\\Users\\Admin\\jioeya.exe /a" b7e807aed17c799c9b49df3da742aa3dfbae077c090c3ea0c0b5d8abe4de081b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jioeya = "C:\\Users\\Admin\\jioeya.exe /d" jioeya.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jioeya = "C:\\Users\\Admin\\jioeya.exe /x" jioeya.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jioeya = "C:\\Users\\Admin\\jioeya.exe /y" jioeya.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7e807aed17c799c9b49df3da742aa3dfbae077c090c3ea0c0b5d8abe4de081b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jioeya.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2168 b7e807aed17c799c9b49df3da742aa3dfbae077c090c3ea0c0b5d8abe4de081b.exe 2168 b7e807aed17c799c9b49df3da742aa3dfbae077c090c3ea0c0b5d8abe4de081b.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe 1504 jioeya.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2168 b7e807aed17c799c9b49df3da742aa3dfbae077c090c3ea0c0b5d8abe4de081b.exe 1504 jioeya.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2168 wrote to memory of 1504 2168 b7e807aed17c799c9b49df3da742aa3dfbae077c090c3ea0c0b5d8abe4de081b.exe 84 PID 2168 wrote to memory of 1504 2168 b7e807aed17c799c9b49df3da742aa3dfbae077c090c3ea0c0b5d8abe4de081b.exe 84 PID 2168 wrote to memory of 1504 2168 b7e807aed17c799c9b49df3da742aa3dfbae077c090c3ea0c0b5d8abe4de081b.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7e807aed17c799c9b49df3da742aa3dfbae077c090c3ea0c0b5d8abe4de081b.exe"C:\Users\Admin\AppData\Local\Temp\b7e807aed17c799c9b49df3da742aa3dfbae077c090c3ea0c0b5d8abe4de081b.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\jioeya.exe"C:\Users\Admin\jioeya.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1504
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304KB
MD50f31fb3e1d304a9268062c154259aae9
SHA1071344769fdfeeda58b2d2f5f0b8f2ac1e6ee936
SHA256993fc108260856ac4905f34a31b611ff8849c26fdad0081086e1900623df30a2
SHA512490b0fe1a3dd219b67bdfa3b7d857bc7fc14b96cabca215d03521097cc1fb60a54d10285e728a6c7954fecd9b41ece847beeb32e19239dc96afa501a63d5c56d