Analysis
-
max time kernel
142s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
13-07-2023 17:25
Static task
static1
Behavioral task
behavioral1
Sample
00a13c385746cbexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
00a13c385746cbexe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
00a13c385746cbexe_JC.exe
-
Size
328KB
-
MD5
00a13c385746cbaa5e26ac35355fc380
-
SHA1
726229f04c914e994e38c4842cb43d5f0ceca274
-
SHA256
fa9557d0e8fe7bf09ae8b098983cba92a14652e15c9ac91e77d334712d4982b1
-
SHA512
e8b9ce390f9a50267d4014ab95f70e56ae7f1ea1d5f3bbc34ec3f48af0a7821a4daf32f52dfa86e9a3f9865b8f772c328eca89c0c0129e378c8a265332bf8e90
-
SSDEEP
6144:92+JS2sFafI8U0obHCW/2a7XQcsPMjVWrG89gkPzDh1v:92TFafJiHCWBWPMjVWrXf1v
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\Control Panel\International\Geo\Nation 00a13c385746cbexe_JC.exe -
Executes dropped EXE 2 IoCs
pid Process 4188 winit32.exe 4632 winit32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\ntdriver\shell\open\command 00a13c385746cbexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\.exe\DefaultIcon 00a13c385746cbexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\.exe\DefaultIcon\ = "%1" 00a13c385746cbexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\.exe\shell\runas 00a13c385746cbexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\Local Settings 00a13c385746cbexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\ntdriver 00a13c385746cbexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\ntdriver\DefaultIcon 00a13c385746cbexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\ntdriver\shell\runas\command\IsolatedCommand = "\"%1\" %*" 00a13c385746cbexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\.exe\Content-Type = "application/x-msdownload" 00a13c385746cbexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\ntdriver\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_32\\winit32.exe\" /START \"%1\" %*" 00a13c385746cbexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\ntdriver\shell\open\command\IsolatedCommand = "\"%1\" %*" 00a13c385746cbexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\ntdriver\shell\runas\command 00a13c385746cbexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\.exe\shell\open 00a13c385746cbexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\ntdriver\DefaultIcon\ = "%1" 00a13c385746cbexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\.exe 00a13c385746cbexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 00a13c385746cbexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 00a13c385746cbexe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 00a13c385746cbexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\ntdriver\shell 00a13c385746cbexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\ntdriver\shell\runas 00a13c385746cbexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\.exe\ = "ntdriver" 00a13c385746cbexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_32\\winit32.exe\" /START \"%1\" %*" 00a13c385746cbexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 00a13c385746cbexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\ntdriver\ = "Application" 00a13c385746cbexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\ntdriver\shell\open 00a13c385746cbexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\ntdriver\shell\runas\command\ = "\"%1\" %*" 00a13c385746cbexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\.exe\shell\open\command 00a13c385746cbexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\ntdriver\Content-Type = "application/x-msdownload" 00a13c385746cbexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\.exe\shell 00a13c385746cbexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\.exe\shell\runas\command 00a13c385746cbexe_JC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4188 winit32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2932 wrote to memory of 4188 2932 00a13c385746cbexe_JC.exe 85 PID 2932 wrote to memory of 4188 2932 00a13c385746cbexe_JC.exe 85 PID 2932 wrote to memory of 4188 2932 00a13c385746cbexe_JC.exe 85 PID 4188 wrote to memory of 4632 4188 winit32.exe 86 PID 4188 wrote to memory of 4632 4188 winit32.exe 86 PID 4188 wrote to memory of 4632 4188 winit32.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\00a13c385746cbexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\00a13c385746cbexe_JC.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\winit32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\winit32.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\winit32.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\winit32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\winit32.exe"3⤵
- Executes dropped EXE
PID:4632
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
328KB
MD53ec2739308287dd0a6ea98e7efdefd99
SHA19518e4adf4a55c8b562585e47913487d2a378eff
SHA2567624c748b6146ed50c6748d06720b98537c15abe8f05452612231f8bf010c8f3
SHA5124e255c3ed7e83370bf9939a723ca752adb4076d59d80b858ea94d5ad6b7d5e33f757a290fade84c6ea7834fa1c09fae2b596c938b3732d20dab47db7978d5a8c
-
Filesize
328KB
MD53ec2739308287dd0a6ea98e7efdefd99
SHA19518e4adf4a55c8b562585e47913487d2a378eff
SHA2567624c748b6146ed50c6748d06720b98537c15abe8f05452612231f8bf010c8f3
SHA5124e255c3ed7e83370bf9939a723ca752adb4076d59d80b858ea94d5ad6b7d5e33f757a290fade84c6ea7834fa1c09fae2b596c938b3732d20dab47db7978d5a8c
-
Filesize
328KB
MD53ec2739308287dd0a6ea98e7efdefd99
SHA19518e4adf4a55c8b562585e47913487d2a378eff
SHA2567624c748b6146ed50c6748d06720b98537c15abe8f05452612231f8bf010c8f3
SHA5124e255c3ed7e83370bf9939a723ca752adb4076d59d80b858ea94d5ad6b7d5e33f757a290fade84c6ea7834fa1c09fae2b596c938b3732d20dab47db7978d5a8c
-
Filesize
328KB
MD53ec2739308287dd0a6ea98e7efdefd99
SHA19518e4adf4a55c8b562585e47913487d2a378eff
SHA2567624c748b6146ed50c6748d06720b98537c15abe8f05452612231f8bf010c8f3
SHA5124e255c3ed7e83370bf9939a723ca752adb4076d59d80b858ea94d5ad6b7d5e33f757a290fade84c6ea7834fa1c09fae2b596c938b3732d20dab47db7978d5a8c