Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
26-08-2023 15:15
Static task
static1
Behavioral task
behavioral1
Sample
b6baee7c17b0c7603c639172e6ff9f642ce4508ba64afedf969a3608204c64e0_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
b6baee7c17b0c7603c639172e6ff9f642ce4508ba64afedf969a3608204c64e0_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
b6baee7c17b0c7603c639172e6ff9f642ce4508ba64afedf969a3608204c64e0_JC.exe
-
Size
192KB
-
MD5
81cbb0338bea846c1163fc19b5a9c174
-
SHA1
9a9ea1ff3704166d4b76838b17159987e30207e8
-
SHA256
b6baee7c17b0c7603c639172e6ff9f642ce4508ba64afedf969a3608204c64e0
-
SHA512
3bf7e26bcd46e80d026f5b2d6fab82fcae56a3e380d9a88f2ee876539037016467adffbd01043e20191b5e83687457a4ce936178bdc38a49e493f55656537ac8
-
SSDEEP
3072:ObhQVe2GRs9ABW7z0QrTauJFFco5cAIp9BAVf2SR3b:HwFs9AsEQfC9jBAVfh
Malware Config
Extracted
buer
https://165.232.118.210/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\fca88cf5f25c50a394b0\\gennt.exe\"" gennt.exe -
resource yara_rule behavioral1/memory/2616-0-0x0000000000230000-0x000000000023F000-memory.dmp buer behavioral1/memory/2616-5-0x0000000040000000-0x000000004000C000-memory.dmp buer behavioral1/memory/2616-2-0x0000000000220000-0x000000000022D000-memory.dmp buer behavioral1/memory/3064-16-0x0000000000240000-0x000000000024F000-memory.dmp buer -
Deletes itself 1 IoCs
pid Process 3064 gennt.exe -
Executes dropped EXE 1 IoCs
pid Process 3064 gennt.exe -
Loads dropped DLL 2 IoCs
pid Process 2616 b6baee7c17b0c7603c639172e6ff9f642ce4508ba64afedf969a3608204c64e0_JC.exe 2616 b6baee7c17b0c7603c639172e6ff9f642ce4508ba64afedf969a3608204c64e0_JC.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2480 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2480 powershell.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2616 wrote to memory of 3064 2616 b6baee7c17b0c7603c639172e6ff9f642ce4508ba64afedf969a3608204c64e0_JC.exe 30 PID 2616 wrote to memory of 3064 2616 b6baee7c17b0c7603c639172e6ff9f642ce4508ba64afedf969a3608204c64e0_JC.exe 30 PID 2616 wrote to memory of 3064 2616 b6baee7c17b0c7603c639172e6ff9f642ce4508ba64afedf969a3608204c64e0_JC.exe 30 PID 2616 wrote to memory of 3064 2616 b6baee7c17b0c7603c639172e6ff9f642ce4508ba64afedf969a3608204c64e0_JC.exe 30 PID 3064 wrote to memory of 2480 3064 gennt.exe 31 PID 3064 wrote to memory of 2480 3064 gennt.exe 31 PID 3064 wrote to memory of 2480 3064 gennt.exe 31 PID 3064 wrote to memory of 2480 3064 gennt.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6baee7c17b0c7603c639172e6ff9f642ce4508ba64afedf969a3608204c64e0_JC.exe"C:\Users\Admin\AppData\Local\Temp\b6baee7c17b0c7603c639172e6ff9f642ce4508ba64afedf969a3608204c64e0_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\ProgramData\fca88cf5f25c50a394b0\gennt.exeC:\ProgramData\fca88cf5f25c50a394b0\gennt.exe "C:\Users\Admin\AppData\Local\Temp\b6baee7c17b0c7603c639172e6ff9f642ce4508ba64afedf969a3608204c64e0_JC.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Deletes itself
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "& {Add-MpPreference -ExclusionPath C:\ProgramData\fca88cf5f25c50a394b0}"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2480
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD581cbb0338bea846c1163fc19b5a9c174
SHA19a9ea1ff3704166d4b76838b17159987e30207e8
SHA256b6baee7c17b0c7603c639172e6ff9f642ce4508ba64afedf969a3608204c64e0
SHA5123bf7e26bcd46e80d026f5b2d6fab82fcae56a3e380d9a88f2ee876539037016467adffbd01043e20191b5e83687457a4ce936178bdc38a49e493f55656537ac8
-
Filesize
192KB
MD581cbb0338bea846c1163fc19b5a9c174
SHA19a9ea1ff3704166d4b76838b17159987e30207e8
SHA256b6baee7c17b0c7603c639172e6ff9f642ce4508ba64afedf969a3608204c64e0
SHA5123bf7e26bcd46e80d026f5b2d6fab82fcae56a3e380d9a88f2ee876539037016467adffbd01043e20191b5e83687457a4ce936178bdc38a49e493f55656537ac8
-
Filesize
192KB
MD581cbb0338bea846c1163fc19b5a9c174
SHA19a9ea1ff3704166d4b76838b17159987e30207e8
SHA256b6baee7c17b0c7603c639172e6ff9f642ce4508ba64afedf969a3608204c64e0
SHA5123bf7e26bcd46e80d026f5b2d6fab82fcae56a3e380d9a88f2ee876539037016467adffbd01043e20191b5e83687457a4ce936178bdc38a49e493f55656537ac8
-
Filesize
192KB
MD581cbb0338bea846c1163fc19b5a9c174
SHA19a9ea1ff3704166d4b76838b17159987e30207e8
SHA256b6baee7c17b0c7603c639172e6ff9f642ce4508ba64afedf969a3608204c64e0
SHA5123bf7e26bcd46e80d026f5b2d6fab82fcae56a3e380d9a88f2ee876539037016467adffbd01043e20191b5e83687457a4ce936178bdc38a49e493f55656537ac8