Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2023, 17:49
Static task
static1
Behavioral task
behavioral1
Sample
fcb6716d8b14fcexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
fcb6716d8b14fcexe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
fcb6716d8b14fcexe_JC.exe
-
Size
35KB
-
MD5
fcb6716d8b14fcb2eafba8cb492ec3bf
-
SHA1
4fa8c65123bc9de2383a1687fec66c9d2070f12f
-
SHA256
7406eeb06ab5db9482bad9e9885e1a0ddbf61e43b93fce4caced9b5729abcb43
-
SHA512
dc76968e2fc4e627232610ad956bd762fe322f4a37083d60c66c760d98e59531281a70803d821c981e719f2347be14ab6ef05ef40a0a3919f0e135d36c26e2ac
-
SSDEEP
384:bgX4uGLLQRcsdeQ7/nQu63Ag7YmecFanrlwfjDUkKDfWf6XT+2ipdCN:bgX4zYcgTEu6QOaryfjqDlCQN
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\Control Panel\International\Geo\Nation fcb6716d8b14fcexe_JC.exe -
Executes dropped EXE 1 IoCs
pid Process 2420 hasfj.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{ABD6AF1B-EAC7-463C-9111-36A17A4B7A98}.catalogItem svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4176 wrote to memory of 2420 4176 fcb6716d8b14fcexe_JC.exe 85 PID 4176 wrote to memory of 2420 4176 fcb6716d8b14fcexe_JC.exe 85 PID 4176 wrote to memory of 2420 4176 fcb6716d8b14fcexe_JC.exe 85 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:1608
-
C:\Users\Admin\AppData\Local\Temp\fcb6716d8b14fcexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\fcb6716d8b14fcexe_JC.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2420
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD56db4dcb584700f846079e26253717755
SHA10c2c356b41597273514d93fd8744648804fc345e
SHA2567c77c138a5d137f7544ab10beac7172f43610eb150739ccb0eda062f194410ec
SHA5129d0cbb762369ddecf5720bed70625edb5e71798fe10c537e3c6b0b684a605b55db5d4165a1c0cb80d8d92358df85e3f00d7487023eb55032c941501ed750e4c9
-
Filesize
35KB
MD56db4dcb584700f846079e26253717755
SHA10c2c356b41597273514d93fd8744648804fc345e
SHA2567c77c138a5d137f7544ab10beac7172f43610eb150739ccb0eda062f194410ec
SHA5129d0cbb762369ddecf5720bed70625edb5e71798fe10c537e3c6b0b684a605b55db5d4165a1c0cb80d8d92358df85e3f00d7487023eb55032c941501ed750e4c9
-
Filesize
35KB
MD56db4dcb584700f846079e26253717755
SHA10c2c356b41597273514d93fd8744648804fc345e
SHA2567c77c138a5d137f7544ab10beac7172f43610eb150739ccb0eda062f194410ec
SHA5129d0cbb762369ddecf5720bed70625edb5e71798fe10c537e3c6b0b684a605b55db5d4165a1c0cb80d8d92358df85e3f00d7487023eb55032c941501ed750e4c9