Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2023, 11:36
Static task
static1
Behavioral task
behavioral1
Sample
1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe
-
Size
361KB
-
MD5
1fff4bcc2d8c4691d0e3c1d311fe147c
-
SHA1
992e99373a995f187fd079170c3610c5e49a912f
-
SHA256
fad044a2cc7e381bc42852e856d0dd24e0dfae085d837313aaf14c3fc26df7ea
-
SHA512
fe40d7c091df7defa4605122288e3fb184c799f7bc6d3582f333279087728e038b52aafc6c5b4a27b808288662e3777584cf47a847cf20d57b350f3b3f30bbee
-
SSDEEP
6144:D+XAyHCjhFMAJgLDe78lEQztqu9/WAv9Bism/pIzH5JDs528EtsofH+n1Jzgt4u:JaObQRd3nUiZi4tst1J0tR
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe sIRC4.exe" 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\DC++ Share\VSTOInstaller.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\setup.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File created C:\Windows\SysWOW64\xdccPrograms\office2016setup.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File created C:\Windows\SysWOW64\xdccPrograms\7zG.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File created C:\Windows\SysWOW64\xdccPrograms\appvcleaner.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File created C:\Windows\SysWOW64\xdccPrograms\InspectorOfficeGadget.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\MavInject32.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File created C:\Windows\SysWOW64\DC++ Share\chrome_pwa_launcher.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File created C:\Windows\SysWOW64\DC++ Share\chrome.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\master_prefere.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File created C:\Windows\SysWOW64\DC++ Share\javac.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File created C:\Windows\SysWOW64\DC++ Share\javafxpackager.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\7z.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\msinfo32.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\ExtExport.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCXACF1.tmp 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File created C:\Windows\SysWOW64\DC++ Share\javadoc.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File created C:\Windows\SysWOW64\xdccPrograms\AppVShNotify.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File created C:\Windows\SysWOW64\DC++ Share\ShapeCollector.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\notification_helper.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\extcheck.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\javadoc.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File created C:\Windows\SysWOW64\sIRC4.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File created C:\Windows\SysWOW64\DC++ Share\msinfo32.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File created C:\Windows\SysWOW64\DC++ Share\OSE.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File created C:\Windows\SysWOW64\DC++ Share\elevation_service.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\javac.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\office2016setup.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File created C:\Windows\SysWOW64\DC++ Share\mip.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File created C:\Windows\SysWOW64\DC++ Share\TabTip.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File created C:\Windows\SysWOW64\DC++ Share\chrmstp.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File created C:\Windows\SysWOW64\DC++ Share\ielowutil.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\iexplore.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File created C:\Windows\SysWOW64\DC++ Share\appletviewer.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\jar.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File created C:\Windows\SysWOW64\DC++ Share\OfficeClickToRun.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File created C:\Windows\SysWOW64\DC++ Share\LICLUA.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File created C:\Windows\SysWOW64\DC++ Share\chrome_proxy.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\iediagcmd.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File created C:\Windows\SysWOW64\DC++ Share\ieinstal.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCXAD71.tmp 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\LICLUA.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File created C:\Windows\SysWOW64\DC++ Share\jabswitch.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File created C:\Windows\SysWOW64\DC++ Share\java.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\java.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\jarsigner.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCXAD30.tmp 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File opened for modification C:\Windows\SysWOW64\sIRC4.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\AppVShNotify.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File created C:\Windows\SysWOW64\DC++ Share\notification_helper.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File created C:\Windows\SysWOW64\DC++ Share\extcheck.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File created C:\Windows\SysWOW64\DC++ Share\jarsigner.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File created C:\Windows\SysWOW64\DC++ Share\setup.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\ielowutil.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\7zG.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File created C:\Windows\SysWOW64\xdccPrograms\IntegratedOffice.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File created C:\Windows\SysWOW64\DC++ Share\MavInject32.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\TabTip.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\chrome_pwa_launcher.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\appletviewer.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\idlj.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\javafxpackager.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File created C:\Windows\SysWOW64\xdccPrograms\Uninstall.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe File created C:\Windows\SysWOW64\DC++ Share\OfficeC2RClient.exe 1fff4bcc2d8c4691d0e3c1d311fe147c_JC.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD54d68e306cd83fd17055fd206f86a65b4
SHA11c180e4b53fb081f03b469b81cfe68434dae54f5
SHA256686caf72ff5daea4f2ce18328f91e36b98dd0f725d873c23c6fec15495d1623c
SHA512401c0267bec7b0ba652a5d15456aa23d1c193e89505d99f95cebae81258ab1d8722e1257f8096c6219960dd5bd7cc96afd53ae6664ac8a912114f1305e068737
-
Filesize
458KB
MD5301824c87b9b96f8aeed148089e273f7
SHA1b7f3d66720331b6358d967344a9dd445c5c32938
SHA2569ab085b3e94d5aff5c4d79932c6220de3f4208027e0be989fd38e15039efa638
SHA512dc07ec6c58dad365c16f1fbe9e065268ff6cd575b86428790a35677e215f06456181f5971bde2daa9b6e680be7cc20e4fb1e4e4d97532e80ae18682964f4ebd3