Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2023, 18:23

General

  • Target

    b8f933b1bdaaf7622803a17d3a1704a9_JC.exe

  • Size

    6.2MB

  • MD5

    b8f933b1bdaaf7622803a17d3a1704a9

  • SHA1

    53bca54b9d1ed076a6f8dc09d35af06706365249

  • SHA256

    d5c740041c08927bac1d5b99d55d6bb1d6308e5208098bc49e4d9ee4b02e12b4

  • SHA512

    7fe259d40ca1cb0ab8ab194438595cba41fc36cc5e248e1d22315fb7c6278c44b4d47c15f550ae553c99ac5c4962a26e078aceb0d2bc0135885e53fb4cf62d6a

  • SSDEEP

    196608:u0/C315uu40siCd5ckTR2pOwtc4qVLnZzVA8lIImrbol:f/C7uBFTcpfERZ5Aksrbol

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b8f933b1bdaaf7622803a17d3a1704a9_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\b8f933b1bdaaf7622803a17d3a1704a9_JC.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:4932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\RCX821D.tmp

    Filesize

    90KB

    MD5

    e1c1bb527d4c5e74bb7680f88d02ebf1

    SHA1

    013c5a1f4c43991327f364cdb745cb65794ff18a

    SHA256

    5ced63addd10718ad27b263dd85c792264e75b1131ce85acc86a6c390707bc78

    SHA512

    827171a94250920dd676e92e753edd729d5512a5a2a7c2996895c38bd0963060de327601669f1133b82ab2c15fe195c2feae28f147b7d79ef9ae3bbff32ab240

  • C:\Windows\SysWOW64\xdccPrograms\7zFM.exe

    Filesize

    6.2MB

    MD5

    f560a57833da43c14fa2442642c7c844

    SHA1

    a48cb0c2c586b165984976fe3caa4ce427c7a0e6

    SHA256

    c6d03cadec11993753917ad047bd1197d4016155ef54942aa219c7f7dfcf6551

    SHA512

    e81e78ad5716664c89fba7e8417333a8dab01176e09f0d9b3eed03998b33313e1b8349cbab6eafda415e720b96207005ed9d5a6fdd3550d7d90619d8413b143b

  • memory/4932-0-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/4932-22-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB