Analysis
-
max time kernel
149s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
04-07-2023 16:52
Static task
static1
Behavioral task
behavioral1
Sample
easyMalicious290f005eb89a.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
easyMalicious290f005eb89a.exe
Resource
win10v2004-20230703-en
General
-
Target
easyMalicious290f005eb89a.exe
-
Size
583KB
-
MD5
c5432a72571b96840cceb1a9f3632e44
-
SHA1
00502b61a8221841057934d8df2d567fcae75112
-
SHA256
f4c9450208b5fe805a5bda89af3308e17b512f693893c120b8eea617fd03f77f
-
SHA512
e3bad37276be2762ee462a92b41c1e8ab114b8e2e40c2b383f2d765212436c93778269e5957d8731b45fefc9c036911e6916514cc64c4f63ece91406b0e8035d
-
SSDEEP
12288:51bz5/JrM6qJyGt9GO0S0QSoFohsMdXZ0aOHvw1mC/9:51bz5Rr/uyQt0SW5dXtjl
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe sIRC4.exe" easyMalicious290f005eb89a.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\xdccPrograms\FlickLearningWizard.exe easyMalicious290f005eb89a.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\InkWatson.exe easyMalicious290f005eb89a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\chrome_pwa_launcher.exe easyMalicious290f005eb89a.exe File created C:\Windows\SysWOW64\DC++ Share\iediagcmd.exe easyMalicious290f005eb89a.exe File created C:\Windows\SysWOW64\DC++ Share\javafxpackager.exe easyMalicious290f005eb89a.exe File created C:\Windows\SysWOW64\xdccPrograms\7zG.exe easyMalicious290f005eb89a.exe File created C:\Windows\SysWOW64\DC++ Share\elevation_service.exe easyMalicious290f005eb89a.exe File created C:\Windows\SysWOW64\DC++ Share\java-rmi.exe easyMalicious290f005eb89a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\javap.exe easyMalicious290f005eb89a.exe File created C:\Windows\SysWOW64\DC++ Share\MSOXMLED.exe easyMalicious290f005eb89a.exe File created C:\Windows\SysWOW64\DC++ Share\chrome_pwa_launcher.exe easyMalicious290f005eb89a.exe File created C:\Windows\SysWOW64\DC++ Share\ieinstal.exe easyMalicious290f005eb89a.exe File created C:\Windows\SysWOW64\DC++ Share\appletviewer.exe easyMalicious290f005eb89a.exe File created C:\Windows\SysWOW64\DC++ Share\jar.exe easyMalicious290f005eb89a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\javac.exe easyMalicious290f005eb89a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\javadoc.exe easyMalicious290f005eb89a.exe File created C:\Windows\SysWOW64\DC++ Share\VSTOInstaller.exe easyMalicious290f005eb89a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\apt.exe easyMalicious290f005eb89a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\java-rmi.exe easyMalicious290f005eb89a.exe File created C:\Windows\SysWOW64\DC++ Share\javadoc.exe easyMalicious290f005eb89a.exe File created C:\Windows\SysWOW64\DC++ Share\javaws.exe easyMalicious290f005eb89a.exe File created C:\Windows\SysWOW64\DC++ Share\ielowutil.exe easyMalicious290f005eb89a.exe File created C:\Windows\SysWOW64\DC++ Share\apt.exe easyMalicious290f005eb89a.exe File created C:\Windows\SysWOW64\DC++ Share\extcheck.exe easyMalicious290f005eb89a.exe File created C:\Windows\SysWOW64\xdccPrograms\FlickLearningWizard.exe easyMalicious290f005eb89a.exe File created C:\Windows\SysWOW64\DC++ Share\jabswitch.exe easyMalicious290f005eb89a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCX5DAE.tmp easyMalicious290f005eb89a.exe File opened for modification C:\Windows\SysWOW64\sIRC4.exe easyMalicious290f005eb89a.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\7zG.exe easyMalicious290f005eb89a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\TabTip.exe easyMalicious290f005eb89a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\chrome.exe easyMalicious290f005eb89a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCX5D6E.tmp easyMalicious290f005eb89a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\java.exe easyMalicious290f005eb89a.exe File created C:\Windows\SysWOW64\xdccPrograms\InkWatson.exe easyMalicious290f005eb89a.exe File created C:\Windows\SysWOW64\DC++ Share\OSPPSVC.exe easyMalicious290f005eb89a.exe File created C:\Windows\SysWOW64\DC++ Share\setup.exe easyMalicious290f005eb89a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\appletviewer.exe easyMalicious290f005eb89a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCX5DEE.tmp easyMalicious290f005eb89a.exe File created C:\Windows\SysWOW64\xdccPrograms\Uninstall.exe easyMalicious290f005eb89a.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\mip.exe easyMalicious290f005eb89a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\ShapeCollector.exe easyMalicious290f005eb89a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCX5D8E.tmp easyMalicious290f005eb89a.exe File created C:\Windows\SysWOW64\DC++ Share\ShapeCollector.exe easyMalicious290f005eb89a.exe File created C:\Windows\SysWOW64\DC++ Share\chrmstp.exe easyMalicious290f005eb89a.exe File created C:\Windows\SysWOW64\DC++ Share\chrome_proxy.exe easyMalicious290f005eb89a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\jabswitch.exe easyMalicious290f005eb89a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\jar.exe easyMalicious290f005eb89a.exe File created C:\Windows\SysWOW64\DC++ Share\javac.exe easyMalicious290f005eb89a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\javaws.exe easyMalicious290f005eb89a.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\7zFM.exe easyMalicious290f005eb89a.exe File created C:\Windows\SysWOW64\xdccPrograms\mip.exe easyMalicious290f005eb89a.exe File created C:\Windows\SysWOW64\DC++ Share\msinfo32.exe easyMalicious290f005eb89a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\elevation_service.exe easyMalicious290f005eb89a.exe File created C:\Windows\SysWOW64\DC++ Share\master_prefere.exe easyMalicious290f005eb89a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\ielowutil.exe easyMalicious290f005eb89a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\iexplore.exe easyMalicious290f005eb89a.exe File created C:\Windows\SysWOW64\DC++ Share\iexplore.exe easyMalicious290f005eb89a.exe File created C:\Windows\SysWOW64\DC++ Share\jarsigner.exe easyMalicious290f005eb89a.exe File created C:\Windows\SysWOW64\DC++ Share\javah.exe easyMalicious290f005eb89a.exe File created C:\Windows\SysWOW64\sIRC4.exe easyMalicious290f005eb89a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\VSTOInstaller.exe easyMalicious290f005eb89a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\setup.exe easyMalicious290f005eb89a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\jarsigner.exe easyMalicious290f005eb89a.exe File created C:\Windows\SysWOW64\xdccPrograms\7z.exe easyMalicious290f005eb89a.exe
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD5b126345317624479f78fbf30b3a1fe5a
SHA1655c966bf7bbf96ee49c83062d30b9dba17d693c
SHA2568723d2d97d52f6d3b63968594c93bf2c5b5300b306c9670be4616cb134964301
SHA512d0be6d608b5f4e482287d16e6587e00be1b4390f78efc3ce63008f99be7358e65f0eef9eba330d845462b64fa7a86cc3f1395b863ad0f8d01c0b790fc2f4c02d
-
Filesize
618KB
MD560aeb47105ce966f553248e726de49ba
SHA1f6704edac7e528d5a257ac823d65ce9a0dc3618b
SHA256aa29c565a45cc1987e135292b1aecd8158a18f7230e2c37afaa9830d55550425
SHA512da6c496ef9927441bf0fbbba95df8e6b7ffed7c55bd2968de896544ce3c447773dd67c4069d4dbcdfa956f24e10f1ec89bcca956e31f0ebbfb943191155c23e1