Analysis
-
max time kernel
142s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2023 12:35
Static task
static1
Behavioral task
behavioral1
Sample
a58aab3bd2cfaa86f7557e33b096c905_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a58aab3bd2cfaa86f7557e33b096c905_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
a58aab3bd2cfaa86f7557e33b096c905_JC.exe
-
Size
40KB
-
MD5
a58aab3bd2cfaa86f7557e33b096c905
-
SHA1
656e534616387ea872005c8a1263a4303a2a1b03
-
SHA256
5a1e87295730feb49362b6b4468b58f05b1f07bc397ac94f25eda5fc0010a701
-
SHA512
1fee3268e2de603362b70182905352420fb298eaf10ab57b684bff2a41d3360bb8ae6e35e0391236e28758d88c7dae9a9663108fe161a551aa03ab8bb0c26435
-
SSDEEP
768:qZL/0F24lercjO4sTZg5ZLvn2IuWZ0kqKNPWQHpa:OLsF2Kerc64sTiX2IV0Dhua
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation a58aab3bd2cfaa86f7557e33b096c905_JC.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation WINWORD.exe -
Executes dropped EXE 2 IoCs
pid Process 3596 WINWORD.exe 3580 WINWORD.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WINWORD = "C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\WINWORD.exe -r" WINWORD.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 3 IoCs
pid Process 2712 PING.EXE 4320 PING.EXE 4568 PING.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1060 wrote to memory of 3596 1060 a58aab3bd2cfaa86f7557e33b096c905_JC.exe 85 PID 1060 wrote to memory of 3596 1060 a58aab3bd2cfaa86f7557e33b096c905_JC.exe 85 PID 1060 wrote to memory of 3596 1060 a58aab3bd2cfaa86f7557e33b096c905_JC.exe 85 PID 3596 wrote to memory of 4864 3596 WINWORD.exe 87 PID 3596 wrote to memory of 4864 3596 WINWORD.exe 87 PID 3596 wrote to memory of 4864 3596 WINWORD.exe 87 PID 4864 wrote to memory of 4320 4864 cmd.exe 89 PID 4864 wrote to memory of 4320 4864 cmd.exe 89 PID 4864 wrote to memory of 4320 4864 cmd.exe 89 PID 4864 wrote to memory of 4568 4864 cmd.exe 93 PID 4864 wrote to memory of 4568 4864 cmd.exe 93 PID 4864 wrote to memory of 4568 4864 cmd.exe 93 PID 4864 wrote to memory of 2712 4864 cmd.exe 96 PID 4864 wrote to memory of 2712 4864 cmd.exe 96 PID 4864 wrote to memory of 2712 4864 cmd.exe 96 PID 4864 wrote to memory of 3580 4864 cmd.exe 97 PID 4864 wrote to memory of 3580 4864 cmd.exe 97 PID 4864 wrote to memory of 3580 4864 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\a58aab3bd2cfaa86f7557e33b096c905_JC.exe"C:\Users\Admin\AppData\Local\Temp\a58aab3bd2cfaa86f7557e33b096c905_JC.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe"C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe" -r2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 2&del "C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe"&ping 127.0.0.1 -n 2&rename "C:\Users\Admin\AppData\Roaming\Mozilla\00000F80" WINWORD.exe&ping 127.0.0.1 -n 2&"C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe" \r3⤵
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 24⤵
- Runs ping.exe
PID:4320
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 24⤵
- Runs ping.exe
PID:4568
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 24⤵
- Runs ping.exe
PID:2712
-
-
C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe"C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe" \r4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3580
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5a8d3778f140e61ebe3c040dbeaeb19b0
SHA15b8b7370200801f10d2040a68162aedc6902323e
SHA2565c42435f01153ba5a15101e4162e05ac5f99d8a6a50553f8efe83432c29a75dc
SHA51211f3d647850d04a2c7ee4710bf755aef5371bf5b4aad3aa7df8993650f74dcbf5d0c7f34ae01789b1a0405c7a88491705fbf9b59d049befbed857d93e2a8b91f
-
Filesize
40KB
MD5a8d3778f140e61ebe3c040dbeaeb19b0
SHA15b8b7370200801f10d2040a68162aedc6902323e
SHA2565c42435f01153ba5a15101e4162e05ac5f99d8a6a50553f8efe83432c29a75dc
SHA51211f3d647850d04a2c7ee4710bf755aef5371bf5b4aad3aa7df8993650f74dcbf5d0c7f34ae01789b1a0405c7a88491705fbf9b59d049befbed857d93e2a8b91f
-
Filesize
40KB
MD5a58aab3bd2cfaa86f7557e33b096c905
SHA1656e534616387ea872005c8a1263a4303a2a1b03
SHA2565a1e87295730feb49362b6b4468b58f05b1f07bc397ac94f25eda5fc0010a701
SHA5121fee3268e2de603362b70182905352420fb298eaf10ab57b684bff2a41d3360bb8ae6e35e0391236e28758d88c7dae9a9663108fe161a551aa03ab8bb0c26435
-
Filesize
40KB
MD5a58aab3bd2cfaa86f7557e33b096c905
SHA1656e534616387ea872005c8a1263a4303a2a1b03
SHA2565a1e87295730feb49362b6b4468b58f05b1f07bc397ac94f25eda5fc0010a701
SHA5121fee3268e2de603362b70182905352420fb298eaf10ab57b684bff2a41d3360bb8ae6e35e0391236e28758d88c7dae9a9663108fe161a551aa03ab8bb0c26435
-
Filesize
40KB
MD5a58aab3bd2cfaa86f7557e33b096c905
SHA1656e534616387ea872005c8a1263a4303a2a1b03
SHA2565a1e87295730feb49362b6b4468b58f05b1f07bc397ac94f25eda5fc0010a701
SHA5121fee3268e2de603362b70182905352420fb298eaf10ab57b684bff2a41d3360bb8ae6e35e0391236e28758d88c7dae9a9663108fe161a551aa03ab8bb0c26435