Analysis
-
max time kernel
140s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
04/07/2023, 15:24
Static task
static1
Behavioral task
behavioral1
Sample
easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe
Resource
win10v2004-20230703-en
General
-
Target
easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe
-
Size
123KB
-
MD5
860048f8b6070d25212f6d681d3cd804
-
SHA1
86cce345692c89234a031623ade926617af68100
-
SHA256
286acdeae54a73eaac6f5346d36a348296f720ada8e4785e1853ebf36a12e9b5
-
SHA512
d7f7a978519b4e7323bd2c7d96467adad38099da704e5dc2146ef0b76c450b850f2f594eb2e3015414698308e19f73890c8b164e3f9814ae2584b830256e2eea
-
SSDEEP
3072:t1B31bdBob2QXkGIyMBI4VW6cpIBvDHD7uMNr:t731bdBaBkG5qI4VWKj7Fp
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe sIRC4.exe" easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\DC++ Share\java.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\javafxpackager.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File opened for modification C:\Windows\SysWOW64\sIRC4.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\7z.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File created C:\Windows\SysWOW64\DC++ Share\MSOXMLED.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\OSPPSVC.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File created C:\Windows\SysWOW64\DC++ Share\setup.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File created C:\Windows\SysWOW64\DC++ Share\jarsigner.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\javap.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\7zG.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File created C:\Windows\SysWOW64\xdccPrograms\mip.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File created C:\Windows\SysWOW64\DC++ Share\ShapeCollector.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\java-rmi.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File created C:\Windows\SysWOW64\DC++ Share\javah.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCX8DF3.tmp easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\InputPersonalization.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\chrmstp.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File created C:\Windows\SysWOW64\DC++ Share\appletviewer.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File created C:\Windows\SysWOW64\xdccPrograms\7zFM.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File created C:\Windows\SysWOW64\DC++ Share\elevation_service.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\idlj.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File created C:\Windows\SysWOW64\DC++ Share\jar.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File created C:\Windows\SysWOW64\DC++ Share\javadoc.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File created C:\Windows\SysWOW64\DC++ Share\javaw.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File created C:\Windows\SysWOW64\xdccPrograms\Uninstall.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File created C:\Windows\SysWOW64\DC++ Share\ielowutil.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File created C:\Windows\SysWOW64\DC++ Share\apt.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCX8D73.tmp easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\jar.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\Uninstall.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File created C:\Windows\SysWOW64\DC++ Share\chrome.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File created C:\Windows\SysWOW64\xdccPrograms\7z.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File created C:\Windows\SysWOW64\DC++ Share\msinfo32.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\jabswitch.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\javadoc.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\VSTOInstaller.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File created C:\Windows\SysWOW64\DC++ Share\DVDMaker.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\elevation_service.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File created C:\Windows\SysWOW64\DC++ Share\javap.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCX8DB3.tmp easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCX8DD3.tmp easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File created C:\Windows\SysWOW64\sIRC4.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\ShapeCollector.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File created C:\Windows\SysWOW64\DC++ Share\TabTip.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\master_prefere.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\iediagcmd.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File created C:\Windows\SysWOW64\DC++ Share\extcheck.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\javac.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\chrome_pwa_launcher.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File created C:\Windows\SysWOW64\DC++ Share\ieinstal.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCX8E53.tmp easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\ConvertInkStore.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File created C:\Windows\SysWOW64\xdccPrograms\InputPersonalization.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File created C:\Windows\SysWOW64\DC++ Share\master_prefere.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File created C:\Windows\SysWOW64\DC++ Share\iediagcmd.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File created C:\Windows\SysWOW64\DC++ Share\javafxpackager.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\FlickLearningWizard.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCX8D52.tmp easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\apt.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCX8D93.tmp easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCX8E14.tmp easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\javaws.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File created C:\Windows\SysWOW64\xdccPrograms\FlickLearningWizard.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe File created C:\Windows\SysWOW64\DC++ Share\VSTOInstaller.exe easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe"C:\Users\Admin\AppData\Local\Temp\easy_Malicious_21e2618bcbfb5fa12821ed6ed974f7ef8a6d9c741932a66f98aade620be5715c.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
PID:2996
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD5b126345317624479f78fbf30b3a1fe5a
SHA1655c966bf7bbf96ee49c83062d30b9dba17d693c
SHA2568723d2d97d52f6d3b63968594c93bf2c5b5300b306c9670be4616cb134964301
SHA512d0be6d608b5f4e482287d16e6587e00be1b4390f78efc3ce63008f99be7358e65f0eef9eba330d845462b64fa7a86cc3f1395b863ad0f8d01c0b790fc2f4c02d
-
Filesize
847KB
MD57639410fd6010331ce4cf7d42f85977c
SHA1609563447f5e11b40ce9671af5fa0de496978221
SHA256a6ddf4d85c57be0376c10e8ab8220939b5c59840d12d99bf870ae8ffdc852fd0
SHA512e93e3d2ea86dfd801fb88e776a4f6ef339199c7d355cef925c4c46a63aa459d42f39b09fdaf9b4aad5155d9984f37261b559af667ef54ebd31e3c60067f23395