Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2023, 16:48
Static task
static1
Behavioral task
behavioral1
Sample
3ef99fba02debc2ef81f3011f86a1372exe_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
3ef99fba02debc2ef81f3011f86a1372exe_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
3ef99fba02debc2ef81f3011f86a1372exe_JC.exe
-
Size
279KB
-
MD5
3ef99fba02debc2ef81f3011f86a1372
-
SHA1
5b21a1779d69466f3a69623fa64c244f6b890332
-
SHA256
f57dab60885da9213f24b4896129182cb29ad3bd7be194685b68d61e6357188b
-
SHA512
5a873f1d1342d739d0cd3d6adc5b59ef08f4a0a9cc81e10a18cc6e7c57db0c673b8520c5ae526e51340f6d17a1c870ca314fa983350b1adb9ab910ca851cd990
-
SSDEEP
3072:iwX3rFrz0c5qakoZLBP0xwx9bc82oO2SmQo38iC296Er621QZCjTX5ityt87hX9:X5rz35qakKp0xwXt2oOz2M57Er62Sty
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation 3ef99fba02debc2ef81f3011f86a1372exe_JC.exe -
Executes dropped EXE 1 IoCs
pid Process 5088 7044704295.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1612 1920 WerFault.exe 81 -
Kills process with taskkill 1 IoCs
pid Process 4664 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4664 taskkill.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1920 wrote to memory of 4956 1920 3ef99fba02debc2ef81f3011f86a1372exe_JC.exe 100 PID 1920 wrote to memory of 4956 1920 3ef99fba02debc2ef81f3011f86a1372exe_JC.exe 100 PID 1920 wrote to memory of 4956 1920 3ef99fba02debc2ef81f3011f86a1372exe_JC.exe 100 PID 4956 wrote to memory of 5088 4956 cmd.exe 102 PID 4956 wrote to memory of 5088 4956 cmd.exe 102 PID 4956 wrote to memory of 5088 4956 cmd.exe 102 PID 1920 wrote to memory of 4872 1920 3ef99fba02debc2ef81f3011f86a1372exe_JC.exe 103 PID 1920 wrote to memory of 4872 1920 3ef99fba02debc2ef81f3011f86a1372exe_JC.exe 103 PID 1920 wrote to memory of 4872 1920 3ef99fba02debc2ef81f3011f86a1372exe_JC.exe 103 PID 4872 wrote to memory of 4664 4872 cmd.exe 107 PID 4872 wrote to memory of 4664 4872 cmd.exe 107 PID 4872 wrote to memory of 4664 4872 cmd.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ef99fba02debc2ef81f3011f86a1372exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\3ef99fba02debc2ef81f3011f86a1372exe_JC.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\7044704295.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\7044704295.exe"C:\Users\Admin\AppData\Local\Temp\7044704295.exe"3⤵
- Executes dropped EXE
PID:5088
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "3ef99fba02debc2ef81f3011f86a1372exe_JC.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\3ef99fba02debc2ef81f3011f86a1372exe_JC.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "3ef99fba02debc2ef81f3011f86a1372exe_JC.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4664
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1920 -s 15642⤵
- Program crash
PID:1612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1920 -ip 19201⤵PID:2568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.5MB
MD5c77f5c3a261a1b92b9c847ee4c72c302
SHA1a7b52f44aed191b79fb4313cb44a76febfec58c2
SHA256da2013c9a3bdd8f73602a4920515357a38b05ddd8488022974db5560dbb3796b
SHA512612cba02f63145de56bc1f60237bee60d496e143a7fee6b4b99506a24bc20dd87754aed324385d0e2bb92e9beda5e7dc9eecb1825074120635922c1715890e05
-
Filesize
4.5MB
MD5c77f5c3a261a1b92b9c847ee4c72c302
SHA1a7b52f44aed191b79fb4313cb44a76febfec58c2
SHA256da2013c9a3bdd8f73602a4920515357a38b05ddd8488022974db5560dbb3796b
SHA512612cba02f63145de56bc1f60237bee60d496e143a7fee6b4b99506a24bc20dd87754aed324385d0e2bb92e9beda5e7dc9eecb1825074120635922c1715890e05