Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2023, 05:07
Static task
static1
Behavioral task
behavioral1
Sample
Setup_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Setup_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
Setup_JC.exe
-
Size
2.2MB
-
MD5
27d747d300ba711e65d0391e0607938d
-
SHA1
bcb8b919a209eab48df8b6ce2eb8745da8a413c9
-
SHA256
7b47b4d8a95cce222ac851ba2a51db39ae96e5b2fa11a471373bf970a6cd0650
-
SHA512
b9c2dd1ef0444530ebcd0bdbbc33947eae3165d6ce1ea88361c978e0911d735d895aebf8d83a5ed4ab07276e252bf1a1c3c5f0e28c01f692d4cce02d8e482c27
-
SSDEEP
24576:h7FUDowAyrTVE3U5FRBULlvx+Ze6lNCvSE9t2BY/2iUI1z2/x2qQnv7T:hBuZrEUkhpiNCvrwBE1a/xkf
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4512 Setup_JC.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2012 wrote to memory of 4512 2012 Setup_JC.exe 86 PID 2012 wrote to memory of 4512 2012 Setup_JC.exe 86 PID 2012 wrote to memory of 4512 2012 Setup_JC.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup_JC.exe"C:\Users\Admin\AppData\Local\Temp\Setup_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\is-BN07Q.tmp\Setup_JC.tmp"C:\Users\Admin\AppData\Local\Temp\is-BN07Q.tmp\Setup_JC.tmp" /SL5="$B021A,886784,0,C:\Users\Admin\AppData\Local\Temp\Setup_JC.exe"2⤵
- Executes dropped EXE
PID:4512
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD538e25f55bcb7aa7541626311ca307a98
SHA123f491b9280c80f6d97afbb2f9ac7ebcbf513a3e
SHA256213e64cac35f2dc6c198b1c508c41cd2911d31c7d70b66ca07bed751328d0fc0
SHA51265c9c44951de99164168cbf997ad62d973fc0838a0bb66c46eabcc04201cde71c9ea7424b90d21cfe5e3177a2e6c870d9c4e437a481b9ae74ae77320667f9341