Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
03-07-2022 09:42
Static task
static1
Behavioral task
behavioral1
Sample
3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe
Resource
win10v2004-20220414-en
General
-
Target
3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe
-
Size
3.2MB
-
MD5
a0d35fb4a7113744983dc503e5fd233b
-
SHA1
95e2d0acd76e56bb79daf32fd63fe499117375a8
-
SHA256
3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934
-
SHA512
e34eb7337ac99b480e72fca5e6da4e973f7a0f78e40deaf5c55367439e9b6ed3fc7f97de071ba217be454208da7c17f3189aabd64ff7b031802ad940281e5f6c
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\:\autorun.inf 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe -
Drops file in Program Files directory 64 IoCs
Processes:
3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exedescription ioc process File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\ktab.exe 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe$ 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Internet Explorer\ExtExport.exe 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\policytool.exe 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\kinit.exe 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File created C:\Program Files\Java\jre1.8.0_66\bin\klist.exe 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\bin\jabswitch.exe 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jp2launcher.exe 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\CLVIEW.EXE 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoev.exe$ 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\pack200.exe 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\lib\nbexec64.exe$ 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javapackager.exe$ 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\java-rmi.exe 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jconsole.exe$ 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\servertool.exe$ 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jabswitch.exe$ 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jabswitch.exe 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\rmid.exe$ 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\keytool.exe$ 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\protocolhandler.exe$ 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe$ 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javadoc.exe$ 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\ktab.exe$ 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\pack200.exe$ 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javaw.exe 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File created C:\Program Files\Microsoft Office\root\Office16\officeappguardwin32.exe 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jdeps.exe$ 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jstat.exe$ 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PDFREFLOW.EXE$ 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\jabswitch.exe 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\javacpl.exe 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\javaws.exe$ 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\servertool.exe 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\ssvagent.exe$ 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jmap.exe 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jstat.exe 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\javaws.exe$ 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File created C:\Program Files\Java\jre1.8.0_66\bin\ssvagent.exe 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\unpack200.exe 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jsadebugd.exe 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\rmic.exe 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\servertool.exe$ 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File created C:\Program Files\Java\jre1.8.0_66\bin\jabswitch.exe 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Addons\OneDriveSetup.exe 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File created C:\Program Files\Microsoft Office\root\Office16\POWERPNT.EXE 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\jar.exe 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\pack200.exe 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File created C:\Program Files\Java\jre1.8.0_66\bin\ktab.exe 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate64.exe$ 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoev.exe 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File created C:\Program Files\Microsoft Office\root\Office16\NAMECONTROLSERVER.EXE 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SDXHelper.exe 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\jdb.exe 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\policytool.exe 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\java.exe$ 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\misc.exe$ 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\POWERPNT.EXE$ 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe$ 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\extcheck.exe$ 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javap.exe$ 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\orbd.exe 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe -
NTFS ADS 1 IoCs
Processes:
3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\:\autorun.inf 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exepid process 4344 3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe"C:\Users\Admin\AppData\Local\Temp\3bc4bec13346d8af99b82beebd0188d94c24dedd5b5476f78809b419675b3934.exe"1⤵
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in Program Files directory
- NTFS ADS
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4344-132-0x0000000000400000-0x000000000040D000-memory.dmpFilesize
52KB