Overview
overview
10Static
static
1ckJTQEOKC_...zip.7z
windows7-x64
1ckJTQEOKC_...zip.7z
windows10-2004-x64
10ckJTQEOKC_...24.zip
windows7-x64
1ckJTQEOKC_...24.zip
windows10-2004-x64
1ckJTQEOKC\...ge.log
windows7-x64
1ckJTQEOKC\...ge.log
windows10-2004-x64
1ckJTQEOKC\...ge.log
windows7-x64
1ckJTQEOKC\...ge.log
windows10-2004-x64
1ckJTQEOKC\...PH.vbs
windows7-x64
1ckJTQEOKC\...PH.vbs
windows10-2004-x64
1ckJTQEOKC\...PH.ps1
windows7-x64
10ckJTQEOKC\...PH.ps1
windows10-2004-x64
10ckJTQEOKC\darm.chh
windows7-x64
3ckJTQEOKC\darm.chh
windows10-2004-x64
3ckJTQEOKC\lite.chh
windows7-x64
3ckJTQEOKC\lite.chh
windows10-2004-x64
3ckJTQEOKC\msedge.log
windows7-x64
1ckJTQEOKC\msedge.log
windows10-2004-x64
1Analysis
-
max time kernel
103s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
28-11-2024 21:26
Static task
static1
Behavioral task
behavioral1
Sample
ckJTQEOKC_28_11_2024.zip.7z
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ckJTQEOKC_28_11_2024.zip.7z
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
ckJTQEOKC_28_11_2024.zip
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
ckJTQEOKC_28_11_2024.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
ckJTQEOKC\0_msedge.log
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
ckJTQEOKC\0_msedge.log
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
ckJTQEOKC\1_msedge.log
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
ckJTQEOKC\1_msedge.log
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
ckJTQEOKC\WdxzhJPH.vbs
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
ckJTQEOKC\WdxzhJPH.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
ckJTQEOKC\WdxzhJPH.ps1
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
ckJTQEOKC\WdxzhJPH.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
ckJTQEOKC\darm.chh
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
ckJTQEOKC\darm.chh
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
ckJTQEOKC\lite.chh
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
ckJTQEOKC\lite.chh
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
ckJTQEOKC\msedge.log
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
ckJTQEOKC\msedge.log
Resource
win10v2004-20241007-en
General
-
Target
ckJTQEOKC\darm.chh
-
Size
1KB
-
MD5
6b831ce8380c693ee6070ad424c9f92b
-
SHA1
b87e2ef196383c246b996c4764e328d523b5c5b7
-
SHA256
a65d23c0df6c750741bb63dee3564ea44462a07050f54a3b585d2c0c4b943e35
-
SHA512
d333149446bd5e83310037b293b1cd73d3a2a15fa9b10ccbcda5fcac70b67e53e86aea4b7c7e0f567106ba3ca45c9856ccc69db7fd75b2d272397e92abf503e4
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AcroRd32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
Processes:
rundll32.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid Process 3032 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid Process 3032 AcroRd32.exe 3032 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid Process procid_target PID 2164 wrote to memory of 2976 2164 cmd.exe 30 PID 2164 wrote to memory of 2976 2164 cmd.exe 30 PID 2164 wrote to memory of 2976 2164 cmd.exe 30 PID 2976 wrote to memory of 3032 2976 rundll32.exe 31 PID 2976 wrote to memory of 3032 2976 rundll32.exe 31 PID 2976 wrote to memory of 3032 2976 rundll32.exe 31 PID 2976 wrote to memory of 3032 2976 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ckJTQEOKC\darm.chh1⤵
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ckJTQEOKC\darm.chh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ckJTQEOKC\darm.chh"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3032
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD54d982b30c90e0eaff7d232e61bd170b3
SHA11afe09df65e11e09082f518b14987372e24e8161
SHA2569117163e6ee2c6bc237f12d3b40e7854b9ca1d6681fc16bc39eaa963ac29b59a
SHA51257513865fddd4633071b7e8b57410bcafda4e5c158f045cbbd76ef4d602cba4348cf41a3af1cbb2ad61bc0decb42832d7bc9cd3bb62fa024da9d139238b7147a