Analysis
-
max time kernel
140s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
04/07/2023, 16:31
Static task
static1
Behavioral task
behavioral1
Sample
easyMalicious184e677feeef.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
easyMalicious184e677feeef.exe
Resource
win10v2004-20230703-en
General
-
Target
easyMalicious184e677feeef.exe
-
Size
114KB
-
MD5
512ff8762a3ac8b51daa3be5067d27ac
-
SHA1
9d84bfc45fd8d3e3bbca8a865d7781682a5f1071
-
SHA256
804db87eb5cc8b6c4775ef00c88269335a7ad9962eb838233583d62e5704ca50
-
SHA512
93825d1517a30dd4973bfc6ca8ddadac6574573d5dc73c8f08abb76c4104e3a41002807ada200942dc208f0c54b90a1eff82e7827eb748cdf6b7153e5a6cb01a
-
SSDEEP
1536:4aiqH1s+kCtrA2UMT0mTFibDKa1XklATx6roQyQbMeROs1ejoWPXdhFd9nXZmdNA:51B31bdBob2QX9TWyczrGXNnQVdm
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe sIRC4.exe" easyMalicious184e677feeef.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\DC++ Share\elevation_service.exe easyMalicious184e677feeef.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\iediagcmd.exe easyMalicious184e677feeef.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\javaws.exe easyMalicious184e677feeef.exe File created C:\Windows\SysWOW64\DC++ Share\chrome.exe easyMalicious184e677feeef.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\extcheck.exe easyMalicious184e677feeef.exe File created C:\Windows\SysWOW64\DC++ Share\javaws.exe easyMalicious184e677feeef.exe File created C:\Windows\SysWOW64\DC++ Share\javap.exe easyMalicious184e677feeef.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\mip.exe easyMalicious184e677feeef.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\TabTip.exe easyMalicious184e677feeef.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCX27F0.tmp easyMalicious184e677feeef.exe File created C:\Windows\SysWOW64\DC++ Share\idlj.exe easyMalicious184e677feeef.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCX28CC.tmp easyMalicious184e677feeef.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCX28EC.tmp easyMalicious184e677feeef.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\7z.exe easyMalicious184e677feeef.exe File created C:\Windows\SysWOW64\DC++ Share\iediagcmd.exe easyMalicious184e677feeef.exe File created C:\Windows\SysWOW64\DC++ Share\appletviewer.exe easyMalicious184e677feeef.exe File created C:\Windows\SysWOW64\DC++ Share\DVDMaker.exe easyMalicious184e677feeef.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\chrome.exe easyMalicious184e677feeef.exe File created C:\Windows\SysWOW64\DC++ Share\jabswitch.exe easyMalicious184e677feeef.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\javafxpackager.exe easyMalicious184e677feeef.exe File created C:\Windows\SysWOW64\xdccPrograms\7z.exe easyMalicious184e677feeef.exe File created C:\Windows\SysWOW64\xdccPrograms\7zFM.exe easyMalicious184e677feeef.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\ConvertInkStore.exe easyMalicious184e677feeef.exe File created C:\Windows\SysWOW64\DC++ Share\chrome_pwa_launcher.exe easyMalicious184e677feeef.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCXC86E.tmp easyMalicious184e677feeef.exe File created C:\Windows\SysWOW64\DC++ Share\setup.exe easyMalicious184e677feeef.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\chrome_proxy.exe easyMalicious184e677feeef.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\master_prefere.exe easyMalicious184e677feeef.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\ShapeCollector.exe easyMalicious184e677feeef.exe File created C:\Windows\SysWOW64\DC++ Share\VSTOInstaller.exe easyMalicious184e677feeef.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\VSTOInstaller.exe easyMalicious184e677feeef.exe File created C:\Windows\SysWOW64\DC++ Share\extcheck.exe easyMalicious184e677feeef.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\idlj.exe easyMalicious184e677feeef.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\javadoc.exe easyMalicious184e677feeef.exe File created C:\Windows\SysWOW64\DC++ Share\master_prefere.exe easyMalicious184e677feeef.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\jabswitch.exe easyMalicious184e677feeef.exe File created C:\Windows\SysWOW64\DC++ Share\jar.exe easyMalicious184e677feeef.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\javaw.exe easyMalicious184e677feeef.exe File created C:\Windows\SysWOW64\xdccPrograms\7zG.exe easyMalicious184e677feeef.exe File created C:\Windows\SysWOW64\xdccPrograms\InkWatson.exe easyMalicious184e677feeef.exe File created C:\Windows\SysWOW64\DC++ Share\notification_helper.exe easyMalicious184e677feeef.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCX286E.tmp easyMalicious184e677feeef.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\javah.exe easyMalicious184e677feeef.exe File created C:\Windows\SysWOW64\DC++ Share\msinfo32.exe easyMalicious184e677feeef.exe File created C:\Windows\SysWOW64\DC++ Share\chrmstp.exe easyMalicious184e677feeef.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\ieinstal.exe easyMalicious184e677feeef.exe File created C:\Windows\SysWOW64\xdccPrograms\InputPersonalization.exe easyMalicious184e677feeef.exe File created C:\Windows\SysWOW64\xdccPrograms\mip.exe easyMalicious184e677feeef.exe File created C:\Windows\SysWOW64\DC++ Share\ShapeCollector.exe easyMalicious184e677feeef.exe File created C:\Windows\SysWOW64\DC++ Share\MSOXMLED.exe easyMalicious184e677feeef.exe File created C:\Windows\SysWOW64\DC++ Share\OSPPSVC.exe easyMalicious184e677feeef.exe File opened for modification C:\Windows\SysWOW64\sIRC4.exe easyMalicious184e677feeef.exe File created C:\Windows\SysWOW64\xdccPrograms\ConvertInkStore.exe easyMalicious184e677feeef.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\FlickLearningWizard.exe easyMalicious184e677feeef.exe File created C:\Windows\SysWOW64\DC++ Share\java.exe easyMalicious184e677feeef.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCX28FD.tmp easyMalicious184e677feeef.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCX254F.tmp easyMalicious184e677feeef.exe File created C:\Windows\SysWOW64\DC++ Share\ieinstal.exe easyMalicious184e677feeef.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\jar.exe easyMalicious184e677feeef.exe File created C:\Windows\SysWOW64\DC++ Share\javac.exe easyMalicious184e677feeef.exe File created C:\Windows\SysWOW64\DC++ Share\javah.exe easyMalicious184e677feeef.exe File created C:\Windows\SysWOW64\DC++ Share\apt.exe easyMalicious184e677feeef.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\jarsigner.exe easyMalicious184e677feeef.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\java-rmi.exe easyMalicious184e677feeef.exe
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD5b126345317624479f78fbf30b3a1fe5a
SHA1655c966bf7bbf96ee49c83062d30b9dba17d693c
SHA2568723d2d97d52f6d3b63968594c93bf2c5b5300b306c9670be4616cb134964301
SHA512d0be6d608b5f4e482287d16e6587e00be1b4390f78efc3ce63008f99be7358e65f0eef9eba330d845462b64fa7a86cc3f1395b863ad0f8d01c0b790fc2f4c02d
-
Filesize
114KB
MD5512ff8762a3ac8b51daa3be5067d27ac
SHA19d84bfc45fd8d3e3bbca8a865d7781682a5f1071
SHA256804db87eb5cc8b6c4775ef00c88269335a7ad9962eb838233583d62e5704ca50
SHA51293825d1517a30dd4973bfc6ca8ddadac6574573d5dc73c8f08abb76c4104e3a41002807ada200942dc208f0c54b90a1eff82e7827eb748cdf6b7153e5a6cb01a