Analysis
-
max time kernel
144s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
13/07/2023, 18:25
Static task
static1
Behavioral task
behavioral1
Sample
05e2114cd803d1exe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
05e2114cd803d1exe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
05e2114cd803d1exe_JC.exe
-
Size
462KB
-
MD5
05e2114cd803d17773b8349e013cc743
-
SHA1
7deb8953b952715f6b3f56f9759aa83a36723eb5
-
SHA256
5b4bfe9205f8f22a4e08846021f2e3c77835b464d5cf2070abca39158c5468f9
-
SHA512
879005c2db98e56dac7be9f901bf609d919266c53032a2cb0060158c1a9799f8f9b9c399852e66fbc3575aa0bbaa0ed51a2e9865fbb2d915ef2f7040f04f7e6c
-
SSDEEP
12288:zJrIik3VcApwH2l8IACW+B+KYN7k0CB3hTYM9:zJrU3VlpwquFrKSo0Cj5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2340 753F.tmp -
Loads dropped DLL 1 IoCs
pid Process 2216 05e2114cd803d1exe_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2808 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2340 753F.tmp -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2808 WINWORD.EXE 2808 WINWORD.EXE 2808 WINWORD.EXE 2808 WINWORD.EXE 2808 WINWORD.EXE 2808 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2340 2216 05e2114cd803d1exe_JC.exe 28 PID 2216 wrote to memory of 2340 2216 05e2114cd803d1exe_JC.exe 28 PID 2216 wrote to memory of 2340 2216 05e2114cd803d1exe_JC.exe 28 PID 2216 wrote to memory of 2340 2216 05e2114cd803d1exe_JC.exe 28 PID 2340 wrote to memory of 2808 2340 753F.tmp 29 PID 2340 wrote to memory of 2808 2340 753F.tmp 29 PID 2340 wrote to memory of 2808 2340 753F.tmp 29 PID 2340 wrote to memory of 2808 2340 753F.tmp 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\05e2114cd803d1exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\05e2114cd803d1exe_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\753F.tmp"C:\Users\Admin\AppData\Local\Temp\753F.tmp" --helpC:\Users\Admin\AppData\Local\Temp\05e2114cd803d1exe_JC.exe 9F4AA9E27B585C9D19F1C7A1AD6EEC6C5CB80CD55502902480FF35E710BD7DCC63078EDB50DAED2F6709B4AEE8186965E9AD8AF8564BFD94CC369A3D14291E8D2⤵
- Executes dropped EXE
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\05e2114cd803d1exe_JC.docx"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2808
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD57079891932a64f097abafd233055a1e9
SHA1246d95feafe67689d49a5a4cadba18d3ac1914e5
SHA256c97189b50e5e92be09966d4732b6d61a2e435b2935d60c09989e555ae442e7a1
SHA5126e9ee6427d7cc2474dc634b088cf3f35d06dfb734d2b63fbbc794f4083b4b5754379daff4804bf5024b1b430aa5e50fa6d839d3473ceeed3043d373c85e9862a
-
Filesize
462KB
MD579a4a1ee8dc3060a526254fff44d4ddf
SHA155edd271aef6be7e019190e3d20ada7810b01ffa
SHA256dc169326cbb61ce7f2a52d9dee5cc63b5722261d8595203775ec7cfc0ad062ab
SHA512e520da4bf73ff9680694060325806b0d0897e17252a027bfa5be7821b8f548099bb6b1ce3bd28a2f560dbbbe3579065af82d5073d73acd4842806810ccbaec01
-
Filesize
462KB
MD579a4a1ee8dc3060a526254fff44d4ddf
SHA155edd271aef6be7e019190e3d20ada7810b01ffa
SHA256dc169326cbb61ce7f2a52d9dee5cc63b5722261d8595203775ec7cfc0ad062ab
SHA512e520da4bf73ff9680694060325806b0d0897e17252a027bfa5be7821b8f548099bb6b1ce3bd28a2f560dbbbe3579065af82d5073d73acd4842806810ccbaec01