Analysis
-
max time kernel
250s -
max time network
359s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2022 11:03
Behavioral task
behavioral1
Sample
ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe
Resource
win10v2004-20221111-en
General
-
Target
ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe
-
Size
4.5MB
-
MD5
4b9eb7effc356c12d0f6f49593b0f85c
-
SHA1
f7ffa9d3683b0952aecf8899a8a3137173e25023
-
SHA256
ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e
-
SHA512
eab1c86ea54d31ba26055df55279294162c065421614dcc8ffc24774f39cbf80546c105932e2e25b1bef70633a93a861c9748f1766d6d35c5121bcfa6169cf47
-
SSDEEP
98304:v3hs0eL1EW2uN16nwNMp9VeEQQD+t0DCZFOs:PFeiL8FiTV31+t0D0F
Malware Config
Extracted
C:\Program Files\7-Zip\Lang\HOW TO RESTORE YOUR FILES.TXT
Signatures
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\jdwpTransport.h.yguekcbe ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\security\java.policy ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\da.pak ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\THIRDPARTYLICENSEREADME-JAVAFX.txt ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\jawt.h.yguekcbe ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt.yguekcbe ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\7-Zip\Lang\ug.txt ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\et.pak ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\te.pak.yguekcbe ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\docs.crx ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\hijrah-config-umalqura.properties.yguekcbe ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\javafx.properties ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\7-Zip\Lang\ky.txt ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\fa.pak ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\fr.pak ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy.jar.yguekcbe ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\security\java.security ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\sound.properties ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\7-Zip\Lang\mng.txt ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\7-Zip\Lang\ta.txt ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\ro.pak.yguekcbe ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\jawt.lib ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\7-Zip\Lang\kab.txt ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\7-Zip\Lang\yo.txt ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\he.pak.yguekcbe ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\vi.pak.yguekcbe ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\zh-CN.pak.yguekcbe ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File created C:\Program Files\Java\jdk1.8.0_66\db\HOW TO RESTORE YOUR FILES.TXT ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_ru.jar.yguekcbe ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\security\cacerts ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt.yguekcbe ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\7-Zip\Lang\tr.txt ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\sv.pak.yguekcbe ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.VisualElementsManifest.xml ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File created C:\Program Files\Java\jdk1.8.0_66\include\HOW TO RESTORE YOUR FILES.TXT ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\7-Zip\Lang\ta.txt.yguekcbe ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\EnterCompress.pot.yguekcbe ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\am.pak ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\ro.pak ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derby.war.yguekcbe ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\fontconfig.bfc ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\7-Zip\7z.sfx ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\7-Zip\Lang\ms.txt ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\es-419.pak.yguekcbe ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\sr.pak.yguekcbe ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy\messages_pt_BR.properties ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\ext\dnsns.jar.yguekcbe ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\ext\jaccess.jar.yguekcbe ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\bg.pak.yguekcbe ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\en-GB.pak ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\7-Zip\Lang\ps.txt.yguekcbe ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\7-Zip\Lang\vi.txt.yguekcbe ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\fonts\LucidaTypewriterBold.ttf ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrome.7z.yguekcbe ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\he.pak ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\COPYRIGHT.yguekcbe ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\NOTICE ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_ja_JP.jar ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\7-Zip\7zCon.sfx.yguekcbe ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt.yguekcbe ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe File opened for modification C:\Program Files\7-Zip\Lang\th.txt ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5096 sc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3356 wrote to memory of 4092 3356 ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe 80 PID 3356 wrote to memory of 4092 3356 ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe 80 PID 4092 wrote to memory of 5096 4092 cmd.exe 82 PID 4092 wrote to memory of 5096 4092 cmd.exe 82 PID 4092 wrote to memory of 4400 4092 cmd.exe 83 PID 4092 wrote to memory of 4400 4092 cmd.exe 83 PID 3356 wrote to memory of 2380 3356 ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe 84 PID 3356 wrote to memory of 2380 3356 ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe"C:\Users\Admin\AppData\Local\Temp\ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\btjucsjxyocsucsalgk.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\system32\sc.exeSC QUERY3⤵
- Launches sc.exe
PID:5096
-
-
C:\Windows\system32\findstr.exeFINDSTR SERVICE_NAME3⤵PID:4400
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\tuoqmacomghbsklpxk.bat2⤵PID:2380
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43B
MD555310bb774fff38cca265dbc70ad6705
SHA1cb8d76e9fd38a0b253056e5f204dab5441fe932b
SHA2561fbdb97893d09d59575c3ef95df3c929fe6b6ddf1b273283e4efadf94cdc802d
SHA51240e5a5e8454ca3eaac36d732550e2c5d869a235e3bbc4d31c4afa038fe4e06f782fa0885e876ad8119be766477fdcc12c1d5d04d53cf6b324e366b5351fc7cd4