Analysis
-
max time kernel
150s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
04-07-2023 17:02
Static task
static1
Behavioral task
behavioral1
Sample
easyMalicious2ebdb39d7c4e.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
easyMalicious2ebdb39d7c4e.exe
Resource
win10v2004-20230703-en
General
-
Target
easyMalicious2ebdb39d7c4e.exe
-
Size
717KB
-
MD5
3690436987b5c388b3ab1a0cd8676849
-
SHA1
c5098977d9d72a90f5ff5ad7095323b95865e241
-
SHA256
15628557ec95cf00fe2ef7cddfd4f2a02dda9a0f960199a88f2e13fb58569706
-
SHA512
c3ab1306971b538255002caaa2c15cd9bdaeabd93cdae3aa89db09bdf2a074b4527f2d924b6cd29c1cc05f5d0c6bd7ed5e72864d747d32b1a89632700527b8b4
-
SSDEEP
12288:51bVjsHP8jyFehcnRXC9ADBJbkPgRg3PZj46kToKmX7ksIxOH4NO3itGG:51bV4HP8jwHnRSiDBJsgmp4+XwUOOy1
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe sIRC4.exe" easyMalicious2ebdb39d7c4e.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\DC++ Share\notification_helper.exe easyMalicious2ebdb39d7c4e.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\chrome_proxy.exe easyMalicious2ebdb39d7c4e.exe File created C:\Windows\SysWOW64\DC++ Share\jar.exe easyMalicious2ebdb39d7c4e.exe File created C:\Windows\SysWOW64\DC++ Share\java.exe easyMalicious2ebdb39d7c4e.exe File created C:\Windows\SysWOW64\DC++ Share\javah.exe easyMalicious2ebdb39d7c4e.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\jarsigner.exe easyMalicious2ebdb39d7c4e.exe File created C:\Windows\SysWOW64\DC++ Share\javadoc.exe easyMalicious2ebdb39d7c4e.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\InputPersonalization.exe easyMalicious2ebdb39d7c4e.exe File created C:\Windows\SysWOW64\DC++ Share\msinfo32.exe easyMalicious2ebdb39d7c4e.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\msinfo32.exe easyMalicious2ebdb39d7c4e.exe File created C:\Windows\SysWOW64\DC++ Share\OSPPSVC.exe easyMalicious2ebdb39d7c4e.exe File created C:\Windows\SysWOW64\DC++ Share\iexplore.exe easyMalicious2ebdb39d7c4e.exe File created C:\Windows\SysWOW64\DC++ Share\apt.exe easyMalicious2ebdb39d7c4e.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\javafxpackager.exe easyMalicious2ebdb39d7c4e.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\java.exe easyMalicious2ebdb39d7c4e.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\7zG.exe easyMalicious2ebdb39d7c4e.exe File created C:\Windows\SysWOW64\xdccPrograms\FlickLearningWizard.exe easyMalicious2ebdb39d7c4e.exe File created C:\Windows\SysWOW64\DC++ Share\DVDMaker.exe easyMalicious2ebdb39d7c4e.exe File created C:\Windows\SysWOW64\DC++ Share\setup.exe easyMalicious2ebdb39d7c4e.exe File created C:\Windows\SysWOW64\DC++ Share\ieinstal.exe easyMalicious2ebdb39d7c4e.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\extcheck.exe easyMalicious2ebdb39d7c4e.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\InkWatson.exe easyMalicious2ebdb39d7c4e.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\chrome.exe easyMalicious2ebdb39d7c4e.exe File created C:\Windows\SysWOW64\DC++ Share\chrome_proxy.exe easyMalicious2ebdb39d7c4e.exe File created C:\Windows\SysWOW64\DC++ Share\ielowutil.exe easyMalicious2ebdb39d7c4e.exe File created C:\Windows\SysWOW64\DC++ Share\javap.exe easyMalicious2ebdb39d7c4e.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCXE306.tmp easyMalicious2ebdb39d7c4e.exe File created C:\Windows\SysWOW64\xdccPrograms\Uninstall.exe easyMalicious2ebdb39d7c4e.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\ielowutil.exe easyMalicious2ebdb39d7c4e.exe File created C:\Windows\SysWOW64\DC++ Share\extcheck.exe easyMalicious2ebdb39d7c4e.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\idlj.exe easyMalicious2ebdb39d7c4e.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\javac.exe easyMalicious2ebdb39d7c4e.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\javadoc.exe easyMalicious2ebdb39d7c4e.exe File created C:\Windows\SysWOW64\xdccPrograms\7zG.exe easyMalicious2ebdb39d7c4e.exe File created C:\Windows\SysWOW64\DC++ Share\ShapeCollector.exe easyMalicious2ebdb39d7c4e.exe File created C:\Windows\SysWOW64\DC++ Share\MSOXMLED.exe easyMalicious2ebdb39d7c4e.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\iexplore.exe easyMalicious2ebdb39d7c4e.exe File created C:\Windows\SysWOW64\DC++ Share\jarsigner.exe easyMalicious2ebdb39d7c4e.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\javaws.exe easyMalicious2ebdb39d7c4e.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCXE2C6.tmp easyMalicious2ebdb39d7c4e.exe File created C:\Windows\SysWOW64\DC++ Share\master_prefere.exe easyMalicious2ebdb39d7c4e.exe File created C:\Windows\SysWOW64\DC++ Share\iediagcmd.exe easyMalicious2ebdb39d7c4e.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCXE216.tmp easyMalicious2ebdb39d7c4e.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\jar.exe easyMalicious2ebdb39d7c4e.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCXE266.tmp easyMalicious2ebdb39d7c4e.exe File created C:\Windows\SysWOW64\DC++ Share\javac.exe easyMalicious2ebdb39d7c4e.exe File created C:\Windows\SysWOW64\xdccPrograms\ConvertInkStore.exe easyMalicious2ebdb39d7c4e.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\chrome_pwa_launcher.exe easyMalicious2ebdb39d7c4e.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\iediagcmd.exe easyMalicious2ebdb39d7c4e.exe File created C:\Windows\SysWOW64\xdccPrograms\7zFM.exe easyMalicious2ebdb39d7c4e.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\VSTOInstaller.exe easyMalicious2ebdb39d7c4e.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\apt.exe easyMalicious2ebdb39d7c4e.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCXE2E6.tmp easyMalicious2ebdb39d7c4e.exe File created C:\Windows\SysWOW64\xdccPrograms\InkWatson.exe easyMalicious2ebdb39d7c4e.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\DVDMaker.exe easyMalicious2ebdb39d7c4e.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\chrmstp.exe easyMalicious2ebdb39d7c4e.exe File opened for modification C:\Windows\SysWOW64\sIRC4.exe easyMalicious2ebdb39d7c4e.exe File created C:\Windows\SysWOW64\DC++ Share\appletviewer.exe easyMalicious2ebdb39d7c4e.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCXE246.tmp easyMalicious2ebdb39d7c4e.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\jabswitch.exe easyMalicious2ebdb39d7c4e.exe File created C:\Windows\SysWOW64\DC++ Share\java-rmi.exe easyMalicious2ebdb39d7c4e.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\javap.exe easyMalicious2ebdb39d7c4e.exe File created C:\Windows\SysWOW64\sIRC4.exe easyMalicious2ebdb39d7c4e.exe File created C:\Windows\SysWOW64\DC++ Share\VSTOInstaller.exe easyMalicious2ebdb39d7c4e.exe
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD5b126345317624479f78fbf30b3a1fe5a
SHA1655c966bf7bbf96ee49c83062d30b9dba17d693c
SHA2568723d2d97d52f6d3b63968594c93bf2c5b5300b306c9670be4616cb134964301
SHA512d0be6d608b5f4e482287d16e6587e00be1b4390f78efc3ce63008f99be7358e65f0eef9eba330d845462b64fa7a86cc3f1395b863ad0f8d01c0b790fc2f4c02d
-
Filesize
750KB
MD52f9a3e1e0b68be36b1c3bcf505fed945
SHA1c271c8a4bb1b5c37884bc8ffdb5a3915819dfa00
SHA25691eccd64d2e825a350e06afee686452ca2f224cf78cfed5d6f337f74cb7daa4c
SHA512fc3958c2df57cc5d83a463af73037d431fb92dc8e9a0aa608ac916ef3816ee82406276b4cbda8d14fd7f7e6ad18d3c02dc9043e256e1208634e21adb85b68b32