Analysis
-
max time kernel
139s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
23/09/2023, 10:51
Static task
static1
Behavioral task
behavioral1
Sample
2556acd090683714713a4ec7031d8d21_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2556acd090683714713a4ec7031d8d21_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2556acd090683714713a4ec7031d8d21_JC.exe
-
Size
478KB
-
MD5
2556acd090683714713a4ec7031d8d21
-
SHA1
c97de6b1c4722742bf5d97d8ee4a24bbb4af3ad8
-
SHA256
c5dee20e96ba6c069d749fa541faf9bb2fdcb88f63804bc4fcd93b5426e32acd
-
SHA512
294c885da8176d4cc10f9fd2ba71c93afc7f36f1df2c3075a41732e7a97e517a98fc614ecb7f4ff856d1a30c0f0e929c3ff91b60059f21fae85de00803611190
-
SSDEEP
6144:7dspDeDrxkg/vrMuJIgwhEFHyOrJcX/Pgqwzm5IzkWjS4e4azExBKO1t4Kb70NqZ:58kxNhOZElO5kkWjhD4A
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\XVF.EXE = "C:\\$Recycle.Bin\\XVF.EXE" 2556acd090683714713a4ec7031d8d21_JC.exe -
Enumerates connected drives 3 TTPs 17 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: 2556acd090683714713a4ec7031d8d21_JC.exe File opened (read-only) \??\G: 2556acd090683714713a4ec7031d8d21_JC.exe File opened (read-only) \??\I: 2556acd090683714713a4ec7031d8d21_JC.exe File opened (read-only) \??\N: 2556acd090683714713a4ec7031d8d21_JC.exe File opened (read-only) \??\R: 2556acd090683714713a4ec7031d8d21_JC.exe File opened (read-only) \??\T: 2556acd090683714713a4ec7031d8d21_JC.exe File opened (read-only) \??\U: 2556acd090683714713a4ec7031d8d21_JC.exe File opened (read-only) \??\J: 2556acd090683714713a4ec7031d8d21_JC.exe File opened (read-only) \??\K: 2556acd090683714713a4ec7031d8d21_JC.exe File opened (read-only) \??\M: 2556acd090683714713a4ec7031d8d21_JC.exe File opened (read-only) \??\O: 2556acd090683714713a4ec7031d8d21_JC.exe File opened (read-only) \??\Q: 2556acd090683714713a4ec7031d8d21_JC.exe File opened (read-only) \??\S: 2556acd090683714713a4ec7031d8d21_JC.exe File opened (read-only) \??\H: 2556acd090683714713a4ec7031d8d21_JC.exe File opened (read-only) \??\P: 2556acd090683714713a4ec7031d8d21_JC.exe File opened (read-only) \??\V: 2556acd090683714713a4ec7031d8d21_JC.exe File opened (read-only) \??\L: 2556acd090683714713a4ec7031d8d21_JC.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile 2556acd090683714713a4ec7031d8d21_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell\open\command\ = "C:\\System Volume Information\\QJCQD.EXE \"%1\"" 2556acd090683714713a4ec7031d8d21_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command 2556acd090683714713a4ec7031d8d21_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file\shell 2556acd090683714713a4ec7031d8d21_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file\shell\open\command\ = "C:\\System Volume Information\\QJCQD.EXE %1" 2556acd090683714713a4ec7031d8d21_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file 2556acd090683714713a4ec7031d8d21_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell\open 2556acd090683714713a4ec7031d8d21_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\open\command\ = "C:\\$Recycle.Bin\\XVF.EXE %1" 2556acd090683714713a4ec7031d8d21_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell\open\command 2556acd090683714713a4ec7031d8d21_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell 2556acd090683714713a4ec7031d8d21_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\System Volume Information\\QJCQD.EXE %1" 2556acd090683714713a4ec7031d8d21_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file\shell\open\command 2556acd090683714713a4ec7031d8d21_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QQQ.file\shell\open 2556acd090683714713a4ec7031d8d21_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\open\command 2556acd090683714713a4ec7031d8d21_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QQQfile\shell\open\command\ = "C:\\$Recycle.Bin\\XVF.EXE \"%1\" %*" 2556acd090683714713a4ec7031d8d21_JC.exe