Analysis
-
max time kernel
123s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
17-09-2023 18:39
Static task
static1
Behavioral task
behavioral1
Sample
eea8b7e5470d11a430902b53c2455233_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
eea8b7e5470d11a430902b53c2455233_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
eea8b7e5470d11a430902b53c2455233_JC.exe
-
Size
124KB
-
MD5
eea8b7e5470d11a430902b53c2455233
-
SHA1
811f45b430deee05b8861478c5153327f45048f2
-
SHA256
d621f8c50bacc88c62443e17b28264ef40afceb2fc4f82d284ca32643f52a965
-
SHA512
3fe7d7edff438a4fdbd9b0c360cc4defb2f6e955bbdf04c896ee0c6e02e66c2d91d15fe199ae79537341c2ce2a6729a1709639edd014bc1021688870cd50d688
-
SSDEEP
3072:qq8f/oic1i9uTAlPQSDwEyWefHEvGdxETCpPJZ:h8f/U1iF/sUGdxETI
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation eea8b7e5470d11a430902b53c2455233_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2588 eea8b7e5470d11a430902b53c2455233_JC.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2588 wrote to memory of 2716 2588 eea8b7e5470d11a430902b53c2455233_JC.exe 85 PID 2588 wrote to memory of 2716 2588 eea8b7e5470d11a430902b53c2455233_JC.exe 85 PID 2588 wrote to memory of 2716 2588 eea8b7e5470d11a430902b53c2455233_JC.exe 85 PID 2716 wrote to memory of 1500 2716 cmd.exe 88 PID 2716 wrote to memory of 1500 2716 cmd.exe 88 PID 2716 wrote to memory of 1500 2716 cmd.exe 88 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1500 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eea8b7e5470d11a430902b53c2455233_JC.exe"C:\Users\Admin\AppData\Local\Temp\eea8b7e5470d11a430902b53c2455233_JC.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\ugh76DA.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\eea8b7e5470d11a430902b53c2455233_JC.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\eea8b7e5470d11a430902b53c2455233_JC.exe"3⤵
- Views/modifies file attributes
PID:1500
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55B
MD539eea66acc5464f4b6c2025676f25c41
SHA1b539811a3025ffecf58238752a0ff34b2e06a392
SHA25627b51b1555329d5b2a49c7929ed0461b05a5da2610dfc5efe437bc2212a007ec
SHA512367074fc2a519f4d97e1c89abb299962ebaa5615315ab2934d6cdc86cf14c7afb87c621723114bbafcbf3a883c9d63f0b2787ee18277b61536c50ac386b2373b