Analysis

  • max time kernel
    152s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/07/2023, 16:42

General

  • Target

    97fba2eeeb7631_JC.exe

  • Size

    317KB

  • MD5

    97fba2eeeb7631ff05bccfac0200c8f3

  • SHA1

    e80ce9e1108d1a8f9e0f365c48476a05a6ed97bd

  • SHA256

    c1886268411ad9fa64345c399ea2a977719bae4846444686c820d60ecf7e7bf0

  • SHA512

    5e0b5bcf1efaf78892361bcfa22c31ceabddbee7bff9556d603a0947e55a71f4d6a90046ff848166b8b634717099f7a6961391d7bd46475699fab0fd749a0007

  • SSDEEP

    6144:bAhM4em+kPsgzr4PZSRfUmSNN67t1Fhi:bJBk0goPZSh/Pt1FY

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 10 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\97fba2eeeb7631_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\97fba2eeeb7631_JC.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Users\Admin\AppData\Local\Temp\97fba2eeeb7631_JC.exe
      "C:\Users\Admin\AppData\Local\Temp\97fba2eeeb7631_JC.exe"
      2⤵
      • Checks computer location settings
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:4828
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tjwhxiwtqc.bat" "
        3⤵
          PID:3180
        • C:\Windows\M-5050572947025827857375865240\winmgr.exe
          C:\Windows\M-5050572947025827857375865240\winmgr.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4604
          • C:\Windows\M-5050572947025827857375865240\winmgr.exe
            C:\Windows\M-5050572947025827857375865240\winmgr.exe
            4⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            PID:3044

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\phqghumeay

            Filesize

            317KB

            MD5

            97fba2eeeb7631ff05bccfac0200c8f3

            SHA1

            e80ce9e1108d1a8f9e0f365c48476a05a6ed97bd

            SHA256

            c1886268411ad9fa64345c399ea2a977719bae4846444686c820d60ecf7e7bf0

            SHA512

            5e0b5bcf1efaf78892361bcfa22c31ceabddbee7bff9556d603a0947e55a71f4d6a90046ff848166b8b634717099f7a6961391d7bd46475699fab0fd749a0007

          • C:\Users\Admin\AppData\Local\Temp\tjwhxiwtqc.bat

            Filesize

            208B

            MD5

            29bd304f49985c001c886d3ebd5f622d

            SHA1

            dd94949282bbe192a710c5c920820c9d208413cb

            SHA256

            a187d2547fedbcd9b13ccbf91472add327a0bc0a5b63fd921be76db585622844

            SHA512

            08e69d97aac07ad73260051b39f36e87a8a11aaad300b58c7b9afabacf6071e092e9be2ddbee9f9d784b0665b205c7e9ea36dccea81b89ac5e10b8beb3209694

          • C:\Windows\M-5050572947025827857375865240\winmgr.exe

            Filesize

            317KB

            MD5

            97fba2eeeb7631ff05bccfac0200c8f3

            SHA1

            e80ce9e1108d1a8f9e0f365c48476a05a6ed97bd

            SHA256

            c1886268411ad9fa64345c399ea2a977719bae4846444686c820d60ecf7e7bf0

            SHA512

            5e0b5bcf1efaf78892361bcfa22c31ceabddbee7bff9556d603a0947e55a71f4d6a90046ff848166b8b634717099f7a6961391d7bd46475699fab0fd749a0007

          • C:\Windows\M-5050572947025827857375865240\winmgr.exe

            Filesize

            317KB

            MD5

            97fba2eeeb7631ff05bccfac0200c8f3

            SHA1

            e80ce9e1108d1a8f9e0f365c48476a05a6ed97bd

            SHA256

            c1886268411ad9fa64345c399ea2a977719bae4846444686c820d60ecf7e7bf0

            SHA512

            5e0b5bcf1efaf78892361bcfa22c31ceabddbee7bff9556d603a0947e55a71f4d6a90046ff848166b8b634717099f7a6961391d7bd46475699fab0fd749a0007

          • C:\Windows\M-5050572947025827857375865240\winmgr.exe

            Filesize

            317KB

            MD5

            97fba2eeeb7631ff05bccfac0200c8f3

            SHA1

            e80ce9e1108d1a8f9e0f365c48476a05a6ed97bd

            SHA256

            c1886268411ad9fa64345c399ea2a977719bae4846444686c820d60ecf7e7bf0

            SHA512

            5e0b5bcf1efaf78892361bcfa22c31ceabddbee7bff9556d603a0947e55a71f4d6a90046ff848166b8b634717099f7a6961391d7bd46475699fab0fd749a0007

          • memory/1204-141-0x0000000003000000-0x000000000305C000-memory.dmp

            Filesize

            368KB

          • memory/1204-136-0x0000000003000000-0x000000000305C000-memory.dmp

            Filesize

            368KB

          • memory/1204-138-0x0000000000620000-0x0000000000720000-memory.dmp

            Filesize

            1024KB

          • memory/3044-162-0x0000000000400000-0x000000000040C000-memory.dmp

            Filesize

            48KB

          • memory/4604-151-0x0000000003000000-0x000000000305C000-memory.dmp

            Filesize

            368KB

          • memory/4604-156-0x00000000005E0000-0x00000000006E0000-memory.dmp

            Filesize

            1024KB

          • memory/4604-159-0x0000000003000000-0x000000000305C000-memory.dmp

            Filesize

            368KB

          • memory/4828-143-0x0000000000400000-0x000000000040C000-memory.dmp

            Filesize

            48KB

          • memory/4828-142-0x0000000000400000-0x000000000040C000-memory.dmp

            Filesize

            48KB

          • memory/4828-139-0x0000000000400000-0x000000000040C000-memory.dmp

            Filesize

            48KB