Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
17/07/2023, 16:51
Static task
static1
Behavioral task
behavioral1
Sample
994c867850f1ab_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
994c867850f1ab_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
994c867850f1ab_JC.exe
-
Size
35KB
-
MD5
994c867850f1ab15a99733975a2e7980
-
SHA1
f1034d13cf880208b7b59470225cf72e7b3f5490
-
SHA256
45e18ab25e87ddd9d4ad0a902009b41cf0420e85d7d87ed77d9d10a44b483555
-
SHA512
7a9971258bfc9803791d87f81f1fbb63cf54a7405d3bfb4dd6ef43c640d35aba374eebadaaee5af22706c985d7e85ca2bbd5d118a2ecb89c343a93b304bcae8e
-
SSDEEP
384:bgX4uGLLQRcsdeQ7/nQu63Ag7YmecFanrlwfjDUkKDfWf0w3Yxp4t8nJ:bgX4zYcgTEu6QOaryfjqDDw303J
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\Control Panel\International\Geo\Nation 994c867850f1ab_JC.exe -
Executes dropped EXE 1 IoCs
pid Process 3392 hasfj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4964 wrote to memory of 3392 4964 994c867850f1ab_JC.exe 86 PID 4964 wrote to memory of 3392 4964 994c867850f1ab_JC.exe 86 PID 4964 wrote to memory of 3392 4964 994c867850f1ab_JC.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\994c867850f1ab_JC.exe"C:\Users\Admin\AppData\Local\Temp\994c867850f1ab_JC.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:3392
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD58272965725c4deab86506092f5d376a0
SHA1c8024180514b7dc766b0b048405bb34d58d8409c
SHA256b001a8a1e21eee6ebf01dce902ecb759f92eef8d4090f2b820785e4051696859
SHA5123cf96d70da4f5cf13c9aab8ceb0d64d4e6ca8f510821fe566f4c380f3e847db2d435e45357cdd28b7e2947d36270d5a2b71401feb593115d28e9e25784f82da1
-
Filesize
35KB
MD58272965725c4deab86506092f5d376a0
SHA1c8024180514b7dc766b0b048405bb34d58d8409c
SHA256b001a8a1e21eee6ebf01dce902ecb759f92eef8d4090f2b820785e4051696859
SHA5123cf96d70da4f5cf13c9aab8ceb0d64d4e6ca8f510821fe566f4c380f3e847db2d435e45357cdd28b7e2947d36270d5a2b71401feb593115d28e9e25784f82da1
-
Filesize
35KB
MD58272965725c4deab86506092f5d376a0
SHA1c8024180514b7dc766b0b048405bb34d58d8409c
SHA256b001a8a1e21eee6ebf01dce902ecb759f92eef8d4090f2b820785e4051696859
SHA5123cf96d70da4f5cf13c9aab8ceb0d64d4e6ca8f510821fe566f4c380f3e847db2d435e45357cdd28b7e2947d36270d5a2b71401feb593115d28e9e25784f82da1