Analysis
-
max time kernel
146s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2023, 13:12
Static task
static1
Behavioral task
behavioral1
Sample
NA_NA_3c9b74f66f1e8fexeexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
NA_NA_3c9b74f66f1e8fexeexe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
NA_NA_3c9b74f66f1e8fexeexe_JC.exe
-
Size
327KB
-
MD5
3c9b74f66f1e8f4e606fb917c4edd3be
-
SHA1
8c398a0bf7465205adbddfa9d3dd07af145ec03f
-
SHA256
986849ad807ec4c2e195c84c2aac0e95171a709b87147e0cd3494d2aafc5edcc
-
SHA512
d4bacadde5dc9d00de7ba1f6ecae70fef58de6e1dede7e8b8f8bc822ef27730d43783f313c236bbbe0f1fa18ef54c7e399aa8907e7c64bdfc98c6846fb9c07c3
-
SSDEEP
6144:fJ2+JS2sFafI8U0obHCW/2a7XQcsPMjVWrG89gkPzDh1v:fJ2TFafJiHCWBWPMjVWrXf1v
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Control Panel\International\Geo\Nation NA_NA_3c9b74f66f1e8fexeexe_JC.exe -
Executes dropped EXE 2 IoCs
pid Process 544 csrssys.exe 1308 csrssys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\.exe\DefaultIcon\ = "%1" NA_NA_3c9b74f66f1e8fexeexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\.exe\shell NA_NA_3c9b74f66f1e8fexeexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\Local Settings NA_NA_3c9b74f66f1e8fexeexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\wexplorer\DefaultIcon\ = "%1" NA_NA_3c9b74f66f1e8fexeexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\wexplorer\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Posix\\csrssys.exe\" /START \"%1\" %*" NA_NA_3c9b74f66f1e8fexeexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\wexplorer\shell\runas\command NA_NA_3c9b74f66f1e8fexeexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" NA_NA_3c9b74f66f1e8fexeexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" NA_NA_3c9b74f66f1e8fexeexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\wexplorer\ = "Application" NA_NA_3c9b74f66f1e8fexeexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\wexplorer\shell\open\command NA_NA_3c9b74f66f1e8fexeexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\wexplorer\shell NA_NA_3c9b74f66f1e8fexeexe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ NA_NA_3c9b74f66f1e8fexeexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\wexplorer\Content-Type = "application/x-msdownload" NA_NA_3c9b74f66f1e8fexeexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\.exe\DefaultIcon NA_NA_3c9b74f66f1e8fexeexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" NA_NA_3c9b74f66f1e8fexeexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\wexplorer\DefaultIcon NA_NA_3c9b74f66f1e8fexeexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\.exe NA_NA_3c9b74f66f1e8fexeexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\.exe\shell\open NA_NA_3c9b74f66f1e8fexeexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\wexplorer NA_NA_3c9b74f66f1e8fexeexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\wexplorer\shell\open\command\IsolatedCommand = "\"%1\" %*" NA_NA_3c9b74f66f1e8fexeexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\wexplorer\shell\runas\command\IsolatedCommand = "\"%1\" %*" NA_NA_3c9b74f66f1e8fexeexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\.exe\shell\runas NA_NA_3c9b74f66f1e8fexeexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\wexplorer\shell\open NA_NA_3c9b74f66f1e8fexeexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\wexplorer\shell\runas\command\ = "\"%1\" %*" NA_NA_3c9b74f66f1e8fexeexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\.exe\ = "wexplorer" NA_NA_3c9b74f66f1e8fexeexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\.exe\shell\open\command NA_NA_3c9b74f66f1e8fexeexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\.exe\shell\runas\command NA_NA_3c9b74f66f1e8fexeexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\wexplorer\shell\runas NA_NA_3c9b74f66f1e8fexeexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\.exe\Content-Type = "application/x-msdownload" NA_NA_3c9b74f66f1e8fexeexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Posix\\csrssys.exe\" /START \"%1\" %*" NA_NA_3c9b74f66f1e8fexeexe_JC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 544 csrssys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4292 wrote to memory of 544 4292 NA_NA_3c9b74f66f1e8fexeexe_JC.exe 88 PID 4292 wrote to memory of 544 4292 NA_NA_3c9b74f66f1e8fexeexe_JC.exe 88 PID 4292 wrote to memory of 544 4292 NA_NA_3c9b74f66f1e8fexeexe_JC.exe 88 PID 544 wrote to memory of 1308 544 csrssys.exe 89 PID 544 wrote to memory of 1308 544 csrssys.exe 89 PID 544 wrote to memory of 1308 544 csrssys.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_3c9b74f66f1e8fexeexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\NA_NA_3c9b74f66f1e8fexeexe_JC.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Users\Admin\AppData\Roaming\Microsoft\Posix\csrssys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Posix\csrssys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\csrssys.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Roaming\Microsoft\Posix\csrssys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Posix\csrssys.exe"3⤵
- Executes dropped EXE
PID:1308
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
327KB
MD5187855db61f62d845e7e34c30766eb29
SHA12946e54d0ecb8b655784e36307c22d585970fcff
SHA256042e07ddf978b2f3371533f58635ef1b119ee61cecd6c3ace90deb38cb001743
SHA512a4a6b1e3616c88ba4ebc1fb3150af7f616f6cfaed1e09a478dcd3d91c7eaa91bcc38856ece6787d62a1409b87a90fcce49456fc49f735a7312c0aad691ebe25d
-
Filesize
327KB
MD5187855db61f62d845e7e34c30766eb29
SHA12946e54d0ecb8b655784e36307c22d585970fcff
SHA256042e07ddf978b2f3371533f58635ef1b119ee61cecd6c3ace90deb38cb001743
SHA512a4a6b1e3616c88ba4ebc1fb3150af7f616f6cfaed1e09a478dcd3d91c7eaa91bcc38856ece6787d62a1409b87a90fcce49456fc49f735a7312c0aad691ebe25d
-
Filesize
327KB
MD5187855db61f62d845e7e34c30766eb29
SHA12946e54d0ecb8b655784e36307c22d585970fcff
SHA256042e07ddf978b2f3371533f58635ef1b119ee61cecd6c3ace90deb38cb001743
SHA512a4a6b1e3616c88ba4ebc1fb3150af7f616f6cfaed1e09a478dcd3d91c7eaa91bcc38856ece6787d62a1409b87a90fcce49456fc49f735a7312c0aad691ebe25d
-
Filesize
327KB
MD5187855db61f62d845e7e34c30766eb29
SHA12946e54d0ecb8b655784e36307c22d585970fcff
SHA256042e07ddf978b2f3371533f58635ef1b119ee61cecd6c3ace90deb38cb001743
SHA512a4a6b1e3616c88ba4ebc1fb3150af7f616f6cfaed1e09a478dcd3d91c7eaa91bcc38856ece6787d62a1409b87a90fcce49456fc49f735a7312c0aad691ebe25d