Analysis

  • max time kernel
    123s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-09-2023 18:39

General

  • Target

    eea8b7e5470d11a430902b53c2455233_JC.exe

  • Size

    124KB

  • MD5

    eea8b7e5470d11a430902b53c2455233

  • SHA1

    811f45b430deee05b8861478c5153327f45048f2

  • SHA256

    d621f8c50bacc88c62443e17b28264ef40afceb2fc4f82d284ca32643f52a965

  • SHA512

    3fe7d7edff438a4fdbd9b0c360cc4defb2f6e955bbdf04c896ee0c6e02e66c2d91d15fe199ae79537341c2ce2a6729a1709639edd014bc1021688870cd50d688

  • SSDEEP

    3072:qq8f/oic1i9uTAlPQSDwEyWefHEvGdxETCpPJZ:h8f/U1iF/sUGdxETI

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eea8b7e5470d11a430902b53c2455233_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\eea8b7e5470d11a430902b53c2455233_JC.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2588
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\ProgramData\ugh76DA.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\eea8b7e5470d11a430902b53c2455233_JC.exe""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2716
      • C:\Windows\SysWOW64\attrib.exe
        attrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\eea8b7e5470d11a430902b53c2455233_JC.exe"
        3⤵
        • Views/modifies file attributes
        PID:1500

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\ugh76DA.tmp.bat

    Filesize

    55B

    MD5

    39eea66acc5464f4b6c2025676f25c41

    SHA1

    b539811a3025ffecf58238752a0ff34b2e06a392

    SHA256

    27b51b1555329d5b2a49c7929ed0461b05a5da2610dfc5efe437bc2212a007ec

    SHA512

    367074fc2a519f4d97e1c89abb299962ebaa5615315ab2934d6cdc86cf14c7afb87c621723114bbafcbf3a883c9d63f0b2787ee18277b61536c50ac386b2373b

  • memory/2588-0-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/2588-5-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB