Analysis
-
max time kernel
141s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
15-08-2023 17:52
Static task
static1
Behavioral task
behavioral1
Sample
fe96c32ee5e4a68691e1cca8b1898bd2376d592bc4e7e7330e1e91fde4a96659exe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
fe96c32ee5e4a68691e1cca8b1898bd2376d592bc4e7e7330e1e91fde4a96659exe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
fe96c32ee5e4a68691e1cca8b1898bd2376d592bc4e7e7330e1e91fde4a96659exe_JC.exe
-
Size
1.2MB
-
MD5
819cebc553434a1b12318d80f63ebd96
-
SHA1
4209938a74864071e1294f884d62920b332b6285
-
SHA256
fe96c32ee5e4a68691e1cca8b1898bd2376d592bc4e7e7330e1e91fde4a96659
-
SHA512
02a4b1a9f1a9bc1774d0d12f2ae3469f9c87000b023844470b8c2341fb1409632d5a5b310d3a2ebbe319a0c4c221ff998ede83728300fce3684562f5d5274b07
-
SSDEEP
24576:tkTS97PSPQJX6qTquZ0eyKjIGER2+pYhUBQ5suPJVWQn652mOVb6lIUR:tkEXYuCcxQYB5DPvds06aq
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1972 icacls.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3640 fe96c32ee5e4a68691e1cca8b1898bd2376d592bc4e7e7330e1e91fde4a96659exe_JC.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3640 fe96c32ee5e4a68691e1cca8b1898bd2376d592bc4e7e7330e1e91fde4a96659exe_JC.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3640 wrote to memory of 2828 3640 fe96c32ee5e4a68691e1cca8b1898bd2376d592bc4e7e7330e1e91fde4a96659exe_JC.exe 82 PID 3640 wrote to memory of 2828 3640 fe96c32ee5e4a68691e1cca8b1898bd2376d592bc4e7e7330e1e91fde4a96659exe_JC.exe 82 PID 3640 wrote to memory of 2828 3640 fe96c32ee5e4a68691e1cca8b1898bd2376d592bc4e7e7330e1e91fde4a96659exe_JC.exe 82 PID 2828 wrote to memory of 1972 2828 cmd.exe 84 PID 2828 wrote to memory of 1972 2828 cmd.exe 84 PID 2828 wrote to memory of 1972 2828 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe96c32ee5e4a68691e1cca8b1898bd2376d592bc4e7e7330e1e91fde4a96659exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\fe96c32ee5e4a68691e1cca8b1898bd2376d592bc4e7e7330e1e91fde4a96659exe_JC.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\SysWOW64\cmd.exe"cmd" /C icacls system_file.exe /setintegritylevel high2⤵
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\icacls.exeicacls system_file.exe /setintegritylevel high3⤵
- Modifies file permissions
PID:1972
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
215KB
MD5dc34e96a8cc7b0eea16fc60e1f53a1fc
SHA17012ef151550f25ea23260cdb263089a87012b2b
SHA256f701f4db8cd215e863fdf683910152a23d43301bd6ab3d038de2a1aaa8553c48
SHA512ba4f38af2e0e64232280fbe0ac3848d367a690915e2cd376aacbf34bca1216e05c31fc643e2fbade088a5dbd3adb68412d0166d1a6971092fd6ba77346f21c6b