Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2023, 13:30
Static task
static1
Behavioral task
behavioral1
Sample
20f674237c97ebexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
20f674237c97ebexe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
20f674237c97ebexe_JC.exe
-
Size
31KB
-
MD5
20f674237c97ebe14bd593711f7ad774
-
SHA1
3a58785caf61de6f0a051eda0335cdae5e9284b0
-
SHA256
2e267cf1433799d0085b8e8a9199cbe91ed917cb1e20ababa42b36e6ccd8aeee
-
SHA512
d4b52e38f12a1e71d111f73119a723d1e8bb874a1f4647baaff471329ba0395f39b9dac75c27f3ead63076b8931c0c3011b87d4268c9659e4dfe732cc43c0cf6
-
SSDEEP
384:bgCOR4uGLLQRcsdeQ72ngEUKK7YmE8jI0nrlwfjDU5ynuKK3B:bgCS4zYcgT/ENr0ryfjGquKK3B
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Control Panel\International\Geo\Nation 20f674237c97ebexe_JC.exe -
Executes dropped EXE 1 IoCs
pid Process 4480 hasfj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1500 wrote to memory of 4480 1500 20f674237c97ebexe_JC.exe 83 PID 1500 wrote to memory of 4480 1500 20f674237c97ebexe_JC.exe 83 PID 1500 wrote to memory of 4480 1500 20f674237c97ebexe_JC.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\20f674237c97ebexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\20f674237c97ebexe_JC.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:4480
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5a06fe89dc8b28b5dfe5b68f1ccb0e4ed
SHA19e63c3b05ea1ebc4a530dd41a86cc7196dc3e877
SHA25634a153a188f031194892660a5efb861ea2ddcc399d877d86aabef51ef52ea9ac
SHA5121992dc365f9dcd8bbf98f2adaa8b7ceff19fe04f9ed6f76d770e75c012c0121d302763a0ae16f17330597df105afee19507755d101f09ac60d9f906286b60083
-
Filesize
31KB
MD5a06fe89dc8b28b5dfe5b68f1ccb0e4ed
SHA19e63c3b05ea1ebc4a530dd41a86cc7196dc3e877
SHA25634a153a188f031194892660a5efb861ea2ddcc399d877d86aabef51ef52ea9ac
SHA5121992dc365f9dcd8bbf98f2adaa8b7ceff19fe04f9ed6f76d770e75c012c0121d302763a0ae16f17330597df105afee19507755d101f09ac60d9f906286b60083
-
Filesize
31KB
MD5a06fe89dc8b28b5dfe5b68f1ccb0e4ed
SHA19e63c3b05ea1ebc4a530dd41a86cc7196dc3e877
SHA25634a153a188f031194892660a5efb861ea2ddcc399d877d86aabef51ef52ea9ac
SHA5121992dc365f9dcd8bbf98f2adaa8b7ceff19fe04f9ed6f76d770e75c012c0121d302763a0ae16f17330597df105afee19507755d101f09ac60d9f906286b60083