Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
07-08-2023 16:01
Static task
static1
Behavioral task
behavioral1
Sample
Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe
Resource
win10v2004-20230703-en
General
-
Target
Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe
-
Size
1.6MB
-
MD5
3e532a53866b708a6ca522be579828b8
-
SHA1
1c42a11620614d839c6ea3ee3e0696f05a113aa9
-
SHA256
72f9dd6bf3a83972f67553bc4ec4be471e130b8f838c69ca07eebeea54738461
-
SHA512
0e46c7d312c27fc08e81b06538198f3631a86811a893658f8d4f4bdb8f25f9022eab34049b6d83761608d7b9839accdc3edf3d5d2e259c18fba2c7477aea17c3
-
SSDEEP
49152:SLTR/kHkzvESF7cGXQmLuQdXMhuh1pt5isg1:W/kHkjfcGXvLu637pt5bg1
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe sIRC4.exe" Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\xdccPrograms\7zFM.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File created C:\Windows\SysWOW64\DC++ Share\OSPPSVC.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File created C:\Windows\SysWOW64\DC++ Share\chrome.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File created C:\Windows\SysWOW64\DC++ Share\master_prefere.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\jarsigner.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCXB515.tmp Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File created C:\Windows\SysWOW64\DC++ Share\msinfo32.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File created C:\Windows\SysWOW64\DC++ Share\jar.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File created C:\Windows\SysWOW64\DC++ Share\javadoc.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCXB4D4.tmp Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCXB4F4.tmp Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File created C:\Windows\SysWOW64\xdccPrograms\InkWatson.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File created C:\Windows\SysWOW64\DC++ Share\jarsigner.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File created C:\Windows\SysWOW64\xdccPrograms\7zG.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File created C:\Windows\SysWOW64\xdccPrograms\FlickLearningWizard.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\chrome_proxy.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File created C:\Windows\SysWOW64\DC++ Share\jabswitch.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\javafxpackager.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\java.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\javah.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File created C:\Windows\SysWOW64\xdccPrograms\7z.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File created C:\Windows\SysWOW64\DC++ Share\setup.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File created C:\Windows\SysWOW64\DC++ Share\chrome_proxy.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\ieinstal.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\idlj.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCXB434.tmp Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\extcheck.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\jabswitch.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File opened for modification C:\Windows\SysWOW64\sIRC4.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\7z.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\7zG.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File created C:\Windows\SysWOW64\xdccPrograms\InputPersonalization.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File created C:\Windows\SysWOW64\DC++ Share\VSTOInstaller.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCXB3F4.tmp Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File created C:\Windows\SysWOW64\DC++ Share\javap.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File created C:\Windows\SysWOW64\DC++ Share\ShapeCollector.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCXB4B4.tmp Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File created C:\Windows\SysWOW64\xdccPrograms\Uninstall.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File created C:\Windows\SysWOW64\xdccPrograms\mip.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\VSTOInstaller.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File created C:\Windows\SysWOW64\sIRC4.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\ConvertInkStore.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCXB414.tmp Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\javadoc.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File created C:\Windows\SysWOW64\DC++ Share\javafxpackager.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File created C:\Windows\SysWOW64\DC++ Share\javah.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\javaw.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\Uninstall.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\chrmstp.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\ielowutil.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File created C:\Windows\SysWOW64\DC++ Share\idlj.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCXB454.tmp Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File created C:\Windows\SysWOW64\DC++ Share\javac.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File created C:\Windows\SysWOW64\xdccPrograms\ConvertInkStore.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\elevation_service.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File created C:\Windows\SysWOW64\DC++ Share\iexplore.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCXB475.tmp Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File created C:\Windows\SysWOW64\DC++ Share\javaw.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\notification_helper.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File created C:\Windows\SysWOW64\DC++ Share\java-rmi.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\javac.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\appletviewer.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File created C:\Windows\SysWOW64\DC++ Share\javaws.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe File created C:\Windows\SysWOW64\xdccPrograms\7zFM.exe Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe"C:\Users\Admin\AppData\Local\Temp\Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
PID:1368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD5b126345317624479f78fbf30b3a1fe5a
SHA1655c966bf7bbf96ee49c83062d30b9dba17d693c
SHA2568723d2d97d52f6d3b63968594c93bf2c5b5300b306c9670be4616cb134964301
SHA512d0be6d608b5f4e482287d16e6587e00be1b4390f78efc3ce63008f99be7358e65f0eef9eba330d845462b64fa7a86cc3f1395b863ad0f8d01c0b790fc2f4c02d
-
Filesize
1.6MB
MD54cfeea5c1f958babe5011352d3e17b8d
SHA1c91575cb9be2fd9fa3800d47227c5f30a30e854a
SHA25639987d9f0d661505a4f4cbf4c99e0953533b6cb2d49fad34968693aa21748b02
SHA512665512d390934bf5789a16ddf03d49ebce5a738e9069153b3c9ec14446e2df2d2515993f0dd858b15df832774326821d82431c3996fe9d60109c2149bab35414