Analysis
-
max time kernel
152s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
17/07/2023, 16:42
Static task
static1
Behavioral task
behavioral1
Sample
97fba2eeeb7631_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
97fba2eeeb7631_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
97fba2eeeb7631_JC.exe
-
Size
317KB
-
MD5
97fba2eeeb7631ff05bccfac0200c8f3
-
SHA1
e80ce9e1108d1a8f9e0f365c48476a05a6ed97bd
-
SHA256
c1886268411ad9fa64345c399ea2a977719bae4846444686c820d60ecf7e7bf0
-
SHA512
5e0b5bcf1efaf78892361bcfa22c31ceabddbee7bff9556d603a0947e55a71f4d6a90046ff848166b8b634717099f7a6961391d7bd46475699fab0fd749a0007
-
SSDEEP
6144:bAhM4em+kPsgzr4PZSRfUmSNN67t1Fhi:bJBk0goPZSh/Pt1FY
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Control Panel\International\Geo\Nation 97fba2eeeb7631_JC.exe -
Executes dropped EXE 2 IoCs
pid Process 4604 winmgr.exe 3044 winmgr.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Manager = "C:\\Windows\\M-5050572947025827857375865240\\winmgr.exe" 97fba2eeeb7631_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Manager = "C:\\Windows\\M-5050572947025827857375865240\\winmgr.exe" 97fba2eeeb7631_JC.exe -
Drops file in System32 directory 10 IoCs
description ioc Process File created C:\Windows\SysWOW64\IME\SHARED\IMESEARCH.EXE winmgr.exe File opened for modification C:\Windows\SysWOW64\IME\SHARED\IMEWDBLD.EXE winmgr.exe File opened for modification C:\Windows\SysWOW64\IME\SHARED\IMCCPHR.exe winmgr.exe File created C:\Windows\SysWOW64\IME\SHARED\imecfmui.exe winmgr.exe File opened for modification C:\Windows\SysWOW64\IME\SHARED\IMEPADSV.EXE winmgr.exe File opened for modification C:\Windows\SysWOW64\IME\SHARED\IMESEARCH.EXE winmgr.exe File created C:\Windows\SysWOW64\IME\SHARED\IMCCPHR.exe winmgr.exe File opened for modification C:\Windows\SysWOW64\IME\SHARED\imecfmui.exe winmgr.exe File created C:\Windows\SysWOW64\IME\SHARED\IMEPADSV.EXE winmgr.exe File created C:\Windows\SysWOW64\IME\SHARED\IMEWDBLD.EXE winmgr.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1204 set thread context of 4828 1204 97fba2eeeb7631_JC.exe 95 PID 4604 set thread context of 3044 4604 winmgr.exe 104 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\M-5050572947025827857375865240\winmgr.exe 97fba2eeeb7631_JC.exe File opened for modification C:\Windows\M-5050572947025827857375865240 97fba2eeeb7631_JC.exe File created C:\Windows\M-5050572947025827857375865240\winmgr.exe 97fba2eeeb7631_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1204 wrote to memory of 4828 1204 97fba2eeeb7631_JC.exe 95 PID 1204 wrote to memory of 4828 1204 97fba2eeeb7631_JC.exe 95 PID 1204 wrote to memory of 4828 1204 97fba2eeeb7631_JC.exe 95 PID 1204 wrote to memory of 4828 1204 97fba2eeeb7631_JC.exe 95 PID 1204 wrote to memory of 4828 1204 97fba2eeeb7631_JC.exe 95 PID 1204 wrote to memory of 4828 1204 97fba2eeeb7631_JC.exe 95 PID 1204 wrote to memory of 4828 1204 97fba2eeeb7631_JC.exe 95 PID 1204 wrote to memory of 4828 1204 97fba2eeeb7631_JC.exe 95 PID 1204 wrote to memory of 4828 1204 97fba2eeeb7631_JC.exe 95 PID 4828 wrote to memory of 3180 4828 97fba2eeeb7631_JC.exe 96 PID 4828 wrote to memory of 3180 4828 97fba2eeeb7631_JC.exe 96 PID 4828 wrote to memory of 3180 4828 97fba2eeeb7631_JC.exe 96 PID 4828 wrote to memory of 4604 4828 97fba2eeeb7631_JC.exe 98 PID 4828 wrote to memory of 4604 4828 97fba2eeeb7631_JC.exe 98 PID 4828 wrote to memory of 4604 4828 97fba2eeeb7631_JC.exe 98 PID 4604 wrote to memory of 3044 4604 winmgr.exe 104 PID 4604 wrote to memory of 3044 4604 winmgr.exe 104 PID 4604 wrote to memory of 3044 4604 winmgr.exe 104 PID 4604 wrote to memory of 3044 4604 winmgr.exe 104 PID 4604 wrote to memory of 3044 4604 winmgr.exe 104 PID 4604 wrote to memory of 3044 4604 winmgr.exe 104 PID 4604 wrote to memory of 3044 4604 winmgr.exe 104 PID 4604 wrote to memory of 3044 4604 winmgr.exe 104 PID 4604 wrote to memory of 3044 4604 winmgr.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\97fba2eeeb7631_JC.exe"C:\Users\Admin\AppData\Local\Temp\97fba2eeeb7631_JC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\97fba2eeeb7631_JC.exe"C:\Users\Admin\AppData\Local\Temp\97fba2eeeb7631_JC.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tjwhxiwtqc.bat" "3⤵PID:3180
-
-
C:\Windows\M-5050572947025827857375865240\winmgr.exeC:\Windows\M-5050572947025827857375865240\winmgr.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\M-5050572947025827857375865240\winmgr.exeC:\Windows\M-5050572947025827857375865240\winmgr.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3044
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
317KB
MD597fba2eeeb7631ff05bccfac0200c8f3
SHA1e80ce9e1108d1a8f9e0f365c48476a05a6ed97bd
SHA256c1886268411ad9fa64345c399ea2a977719bae4846444686c820d60ecf7e7bf0
SHA5125e0b5bcf1efaf78892361bcfa22c31ceabddbee7bff9556d603a0947e55a71f4d6a90046ff848166b8b634717099f7a6961391d7bd46475699fab0fd749a0007
-
Filesize
208B
MD529bd304f49985c001c886d3ebd5f622d
SHA1dd94949282bbe192a710c5c920820c9d208413cb
SHA256a187d2547fedbcd9b13ccbf91472add327a0bc0a5b63fd921be76db585622844
SHA51208e69d97aac07ad73260051b39f36e87a8a11aaad300b58c7b9afabacf6071e092e9be2ddbee9f9d784b0665b205c7e9ea36dccea81b89ac5e10b8beb3209694
-
Filesize
317KB
MD597fba2eeeb7631ff05bccfac0200c8f3
SHA1e80ce9e1108d1a8f9e0f365c48476a05a6ed97bd
SHA256c1886268411ad9fa64345c399ea2a977719bae4846444686c820d60ecf7e7bf0
SHA5125e0b5bcf1efaf78892361bcfa22c31ceabddbee7bff9556d603a0947e55a71f4d6a90046ff848166b8b634717099f7a6961391d7bd46475699fab0fd749a0007
-
Filesize
317KB
MD597fba2eeeb7631ff05bccfac0200c8f3
SHA1e80ce9e1108d1a8f9e0f365c48476a05a6ed97bd
SHA256c1886268411ad9fa64345c399ea2a977719bae4846444686c820d60ecf7e7bf0
SHA5125e0b5bcf1efaf78892361bcfa22c31ceabddbee7bff9556d603a0947e55a71f4d6a90046ff848166b8b634717099f7a6961391d7bd46475699fab0fd749a0007
-
Filesize
317KB
MD597fba2eeeb7631ff05bccfac0200c8f3
SHA1e80ce9e1108d1a8f9e0f365c48476a05a6ed97bd
SHA256c1886268411ad9fa64345c399ea2a977719bae4846444686c820d60ecf7e7bf0
SHA5125e0b5bcf1efaf78892361bcfa22c31ceabddbee7bff9556d603a0947e55a71f4d6a90046ff848166b8b634717099f7a6961391d7bd46475699fab0fd749a0007