Analysis
-
max time kernel
70s -
max time network
71s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22/02/2025, 18:40
Behavioral task
behavioral1
Sample
ECFHIJKJKF.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ECFHIJKJKF.exe
Resource
win10v2004-20250217-en
General
-
Target
ECFHIJKJKF.exe
-
Size
2.7MB
-
MD5
d4f872f71cebfc96d63b8fd16fe59ff3
-
SHA1
249c011ffde1ea311d394e989cc4386f550c682b
-
SHA256
192c8443cd0910ef43c8b86e00ea336fcd8c83b1b236d5cd4386ce37b1eda168
-
SHA512
d367cb6ed066ebbc93a7c7e0cf5cbe28a8fd0f08f67c619b1539045e8ca41d1f3a7a3a9985d4e981e1eadf5be4c318eccb7613ab27b863098ad0b29219feba66
-
SSDEEP
49152:eam9wInUiMWR4bufkBqSk9K5+mUv+F42YcCmph7XZhak:HjMoXUWF4Fmr7XZha
Malware Config
Signatures
-
Detects HijackLoader (aka IDAT Loader) 1 IoCs
resource yara_rule behavioral1/memory/2304-1-0x0000000000400000-0x00000000006B1000-memory.dmp family_hijackloader -
HijackLoader
HijackLoader is a multistage loader first seen in 2023.
-
Hijackloader family
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2304 set thread context of 2864 2304 ECFHIJKJKF.exe 29 PID 2864 set thread context of 1748 2864 cmd.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ECFHIJKJKF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2304 ECFHIJKJKF.exe 2304 ECFHIJKJKF.exe 2864 cmd.exe 2864 cmd.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2304 ECFHIJKJKF.exe 2864 cmd.exe 2864 cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1748 MSBuild.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2864 2304 ECFHIJKJKF.exe 29 PID 2304 wrote to memory of 2864 2304 ECFHIJKJKF.exe 29 PID 2304 wrote to memory of 2864 2304 ECFHIJKJKF.exe 29 PID 2304 wrote to memory of 2864 2304 ECFHIJKJKF.exe 29 PID 2304 wrote to memory of 2864 2304 ECFHIJKJKF.exe 29 PID 2864 wrote to memory of 1748 2864 cmd.exe 31 PID 2864 wrote to memory of 1748 2864 cmd.exe 31 PID 2864 wrote to memory of 1748 2864 cmd.exe 31 PID 2864 wrote to memory of 1748 2864 cmd.exe 31 PID 2864 wrote to memory of 1748 2864 cmd.exe 31 PID 2864 wrote to memory of 1748 2864 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ECFHIJKJKF.exe"C:\Users\Admin\AppData\Local\Temp\ECFHIJKJKF.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1748
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
710KB
MD52422777e4a868e672c31764635a8b5e9
SHA13f174d87415299a1f0a7873fd659945b93b8edb4
SHA256a25a20871d9ab6b54be4e22824b3c0346f2e998a67359d4cdf8e30a8e6e7cbf0
SHA5122f5440a48762714ef3ed1c9d599aafc3b43a0b7871bd30a7d391f29e41762dab43861ef5275d666625c5c29d829967da59a43d75aaff1339149c998c4dfc5b75