Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
17/07/2023, 17:05
Static task
static1
Behavioral task
behavioral1
Sample
9aaa34279e2c0a_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
9aaa34279e2c0a_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
9aaa34279e2c0a_JC.exe
-
Size
44KB
-
MD5
9aaa34279e2c0a6b45154789cd64b678
-
SHA1
2d5554e69232e027f4e9e4e50a0c66e5f13a3ef5
-
SHA256
281f08b016cc94c8b95367dfb0e9154423f2b3f919d4e0a1f36d4c69ccd0ccc2
-
SHA512
b3fe922aef9080b761604db8c58541498041c80a5afabc01ba091f6fd7d72f8489c71257a63027ae48dd35946e65dbaf9c8ccef2e6b99593d1feed863f26e764
-
SSDEEP
768:bIDOw9UiaCHfjnE0Sfa7ilR0p9u6p4Uu6EIZPT:bIDOw9a0DwitDwIZr
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\Control Panel\International\Geo\Nation 9aaa34279e2c0a_JC.exe -
Executes dropped EXE 1 IoCs
pid Process 4324 lossy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2328 wrote to memory of 4324 2328 9aaa34279e2c0a_JC.exe 85 PID 2328 wrote to memory of 4324 2328 9aaa34279e2c0a_JC.exe 85 PID 2328 wrote to memory of 4324 2328 9aaa34279e2c0a_JC.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\9aaa34279e2c0a_JC.exe"C:\Users\Admin\AppData\Local\Temp\9aaa34279e2c0a_JC.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\lossy.exe"C:\Users\Admin\AppData\Local\Temp\lossy.exe"2⤵
- Executes dropped EXE
PID:4324
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD57f5165cd46a532aa4cf7b66e029dfb40
SHA101e37134fe6c89d0b14b92cd15e665c7dcfd3f56
SHA256c5899a8b050bb5ee1b894dd20e71b49954bf73bb0ecb7fe83ef86e94517f973d
SHA51227144d867ccbd2739105a6841c3412b2969efe65caab6ae7a62203f917a778767ebdb0c5e18c6e63e4ee5e13590c0d7323e774a2d12075f8fa468dd4ed3c195b
-
Filesize
44KB
MD57f5165cd46a532aa4cf7b66e029dfb40
SHA101e37134fe6c89d0b14b92cd15e665c7dcfd3f56
SHA256c5899a8b050bb5ee1b894dd20e71b49954bf73bb0ecb7fe83ef86e94517f973d
SHA51227144d867ccbd2739105a6841c3412b2969efe65caab6ae7a62203f917a778767ebdb0c5e18c6e63e4ee5e13590c0d7323e774a2d12075f8fa468dd4ed3c195b
-
Filesize
44KB
MD57f5165cd46a532aa4cf7b66e029dfb40
SHA101e37134fe6c89d0b14b92cd15e665c7dcfd3f56
SHA256c5899a8b050bb5ee1b894dd20e71b49954bf73bb0ecb7fe83ef86e94517f973d
SHA51227144d867ccbd2739105a6841c3412b2969efe65caab6ae7a62203f917a778767ebdb0c5e18c6e63e4ee5e13590c0d7323e774a2d12075f8fa468dd4ed3c195b