Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18/07/2023, 13:20
Static task
static1
Behavioral task
behavioral1
Sample
b617067aefa43a_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
b617067aefa43a_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
b617067aefa43a_JC.exe
-
Size
288KB
-
MD5
b617067aefa43a03bd7890dc4c0213b1
-
SHA1
541c957b3cb682633f62f3fe29f7769eb5e72383
-
SHA256
0690d15bacf8953fd9e62880a4056b29445057ebb8e8f034b3e598ddd0f19cc8
-
SHA512
5c26ef70a74253879818aad646579453367cdf11709107e04e1f5409070d8d71fd3d14978a4846c2384223aa4bb897f4c1d364c61cece60f05091896bb07b14a
-
SSDEEP
6144:dQ+Tyfx4NF67Sbq2nW82X45gc3BaLZVS0mOoC8zbzDie:dQMyfmNFHfnWfhLZVHmOog
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\Control Panel\International\Geo\Nation b617067aefa43a_JC.exe -
Executes dropped EXE 2 IoCs
pid Process 3612 dwmsys.exe 1888 dwmsys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Posix\\dwmsys.exe\" /START \"%1\" %*" b617067aefa43a_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\Local Settings b617067aefa43a_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\systemui\DefaultIcon\ = "%1" b617067aefa43a_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\systemui\shell\open b617067aefa43a_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\Content-Type = "application/x-msdownload" b617067aefa43a_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\shell\runas b617067aefa43a_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\systemui\ = "Application" b617067aefa43a_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\systemui\Content-Type = "application/x-msdownload" b617067aefa43a_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\systemui\shell\runas\command\IsolatedCommand = "\"%1\" %*" b617067aefa43a_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\systemui\shell\runas\command b617067aefa43a_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\shell\open\command b617067aefa43a_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" b617067aefa43a_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\systemui b617067aefa43a_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\systemui\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Posix\\dwmsys.exe\" /START \"%1\" %*" b617067aefa43a_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\systemui\shell\runas b617067aefa43a_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\systemui\shell\runas\command\ = "\"%1\" %*" b617067aefa43a_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\shell\open b617067aefa43a_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" b617067aefa43a_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\systemui\DefaultIcon b617067aefa43a_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\systemui\shell b617067aefa43a_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" b617067aefa43a_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ b617067aefa43a_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\systemui\shell\open\command\IsolatedCommand = "\"%1\" %*" b617067aefa43a_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe b617067aefa43a_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\DefaultIcon\ = "%1" b617067aefa43a_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\shell b617067aefa43a_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\shell\runas\command b617067aefa43a_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\systemui\shell\open\command b617067aefa43a_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\ = "systemui" b617067aefa43a_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\DefaultIcon b617067aefa43a_JC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3612 dwmsys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2996 wrote to memory of 3612 2996 b617067aefa43a_JC.exe 85 PID 2996 wrote to memory of 3612 2996 b617067aefa43a_JC.exe 85 PID 2996 wrote to memory of 3612 2996 b617067aefa43a_JC.exe 85 PID 3612 wrote to memory of 1888 3612 dwmsys.exe 86 PID 3612 wrote to memory of 1888 3612 dwmsys.exe 86 PID 3612 wrote to memory of 1888 3612 dwmsys.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\b617067aefa43a_JC.exe"C:\Users\Admin\AppData\Local\Temp\b617067aefa43a_JC.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Roaming\Microsoft\Posix\dwmsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Posix\dwmsys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\dwmsys.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\AppData\Roaming\Microsoft\Posix\dwmsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Posix\dwmsys.exe"3⤵
- Executes dropped EXE
PID:1888
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288KB
MD5705b43aef865c1967282f07a64cf66b9
SHA1af6417325b284edc1dbafa06a7ee74a2cf228281
SHA2569ccdf1cb250f4258bb1cca9c791b08527c6d46b6d8f603ea796086d6485a994a
SHA5128eccbf96d386da4143afa5a7b04f87685728064baebcb0bf7e4a44a0f6933a7add8dc7d3e4caff5dfefe9a1f939069f28eb2f245b10abbcd5d013a089937f785
-
Filesize
288KB
MD5705b43aef865c1967282f07a64cf66b9
SHA1af6417325b284edc1dbafa06a7ee74a2cf228281
SHA2569ccdf1cb250f4258bb1cca9c791b08527c6d46b6d8f603ea796086d6485a994a
SHA5128eccbf96d386da4143afa5a7b04f87685728064baebcb0bf7e4a44a0f6933a7add8dc7d3e4caff5dfefe9a1f939069f28eb2f245b10abbcd5d013a089937f785
-
Filesize
288KB
MD5705b43aef865c1967282f07a64cf66b9
SHA1af6417325b284edc1dbafa06a7ee74a2cf228281
SHA2569ccdf1cb250f4258bb1cca9c791b08527c6d46b6d8f603ea796086d6485a994a
SHA5128eccbf96d386da4143afa5a7b04f87685728064baebcb0bf7e4a44a0f6933a7add8dc7d3e4caff5dfefe9a1f939069f28eb2f245b10abbcd5d013a089937f785
-
Filesize
288KB
MD5705b43aef865c1967282f07a64cf66b9
SHA1af6417325b284edc1dbafa06a7ee74a2cf228281
SHA2569ccdf1cb250f4258bb1cca9c791b08527c6d46b6d8f603ea796086d6485a994a
SHA5128eccbf96d386da4143afa5a7b04f87685728064baebcb0bf7e4a44a0f6933a7add8dc7d3e4caff5dfefe9a1f939069f28eb2f245b10abbcd5d013a089937f785