Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/02/2025, 18:48
Behavioral task
behavioral1
Sample
ECFHIJKJKF.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ECFHIJKJKF.exe
Resource
win10v2004-20250217-en
General
-
Target
ECFHIJKJKF.exe
-
Size
2.7MB
-
MD5
d4f872f71cebfc96d63b8fd16fe59ff3
-
SHA1
249c011ffde1ea311d394e989cc4386f550c682b
-
SHA256
192c8443cd0910ef43c8b86e00ea336fcd8c83b1b236d5cd4386ce37b1eda168
-
SHA512
d367cb6ed066ebbc93a7c7e0cf5cbe28a8fd0f08f67c619b1539045e8ca41d1f3a7a3a9985d4e981e1eadf5be4c318eccb7613ab27b863098ad0b29219feba66
-
SSDEEP
49152:eam9wInUiMWR4bufkBqSk9K5+mUv+F42YcCmph7XZhak:HjMoXUWF4Fmr7XZha
Malware Config
Signatures
-
Detects HijackLoader (aka IDAT Loader) 1 IoCs
resource yara_rule behavioral1/memory/2684-0-0x0000000000400000-0x00000000006B1000-memory.dmp family_hijackloader -
HijackLoader
HijackLoader is a multistage loader first seen in 2023.
-
Hijackloader family
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2684 set thread context of 2764 2684 ECFHIJKJKF.exe 31 PID 2764 set thread context of 2928 2764 cmd.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ECFHIJKJKF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2684 ECFHIJKJKF.exe 2684 ECFHIJKJKF.exe 2764 cmd.exe 2764 cmd.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2684 ECFHIJKJKF.exe 2764 cmd.exe 2764 cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2928 MSBuild.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2764 2684 ECFHIJKJKF.exe 31 PID 2684 wrote to memory of 2764 2684 ECFHIJKJKF.exe 31 PID 2684 wrote to memory of 2764 2684 ECFHIJKJKF.exe 31 PID 2684 wrote to memory of 2764 2684 ECFHIJKJKF.exe 31 PID 2684 wrote to memory of 2764 2684 ECFHIJKJKF.exe 31 PID 2764 wrote to memory of 2928 2764 cmd.exe 33 PID 2764 wrote to memory of 2928 2764 cmd.exe 33 PID 2764 wrote to memory of 2928 2764 cmd.exe 33 PID 2764 wrote to memory of 2928 2764 cmd.exe 33 PID 2764 wrote to memory of 2928 2764 cmd.exe 33 PID 2764 wrote to memory of 2928 2764 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ECFHIJKJKF.exe"C:\Users\Admin\AppData\Local\Temp\ECFHIJKJKF.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
710KB
MD5590fa1951dc6b44b3bc41316f8eb1b73
SHA18e00bde921f85dab34057e7950f8464ad4746d1f
SHA256132ccbd789a795eb2a267afa58e41f330f21ddaf805d0fe950114b09fdf29950
SHA512f0d9e5b602ec24e84d6580d514400277bd15ae271708475bb7423c9c9e927d370076591cd90de580521f64cac650084f6624b3b186fbdebcd714617a3a40a25f