Analysis

  • max time kernel
    141s
  • max time network
    117s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-08-2023 17:52

General

  • Target

    fe96c32ee5e4a68691e1cca8b1898bd2376d592bc4e7e7330e1e91fde4a96659exe_JC.exe

  • Size

    1.2MB

  • MD5

    819cebc553434a1b12318d80f63ebd96

  • SHA1

    4209938a74864071e1294f884d62920b332b6285

  • SHA256

    fe96c32ee5e4a68691e1cca8b1898bd2376d592bc4e7e7330e1e91fde4a96659

  • SHA512

    02a4b1a9f1a9bc1774d0d12f2ae3469f9c87000b023844470b8c2341fb1409632d5a5b310d3a2ebbe319a0c4c221ff998ede83728300fce3684562f5d5274b07

  • SSDEEP

    24576:tkTS97PSPQJX6qTquZ0eyKjIGER2+pYhUBQ5suPJVWQn652mOVb6lIUR:tkEXYuCcxQYB5DPvds06aq

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe96c32ee5e4a68691e1cca8b1898bd2376d592bc4e7e7330e1e91fde4a96659exe_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\fe96c32ee5e4a68691e1cca8b1898bd2376d592bc4e7e7330e1e91fde4a96659exe_JC.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3640
    • C:\Windows\SysWOW64\cmd.exe
      "cmd" /C icacls system_file.exe /setintegritylevel high
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2828
      • C:\Windows\SysWOW64\icacls.exe
        icacls system_file.exe /setintegritylevel high
        3⤵
        • Modifies file permissions
        PID:1972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\system_file.exe

    Filesize

    215KB

    MD5

    dc34e96a8cc7b0eea16fc60e1f53a1fc

    SHA1

    7012ef151550f25ea23260cdb263089a87012b2b

    SHA256

    f701f4db8cd215e863fdf683910152a23d43301bd6ab3d038de2a1aaa8553c48

    SHA512

    ba4f38af2e0e64232280fbe0ac3848d367a690915e2cd376aacbf34bca1216e05c31fc643e2fbade088a5dbd3adb68412d0166d1a6971092fd6ba77346f21c6b

  • memory/3640-135-0x00000000001F0000-0x0000000000334000-memory.dmp

    Filesize

    1.3MB