Analysis
-
max time kernel
141s -
max time network
29s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10/10/2023, 21:48
Static task
static1
Behavioral task
behavioral1
Sample
240f743d0aa82d668e5a37d6af222da2_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
240f743d0aa82d668e5a37d6af222da2_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
240f743d0aa82d668e5a37d6af222da2_JC.exe
-
Size
1.5MB
-
MD5
240f743d0aa82d668e5a37d6af222da2
-
SHA1
9c446529329297b69b8b829388afa79240c98695
-
SHA256
c93173cb6f9375bc5ba8f3dc19f638b529db7b022b00cc4d9c24346f432f1a7e
-
SHA512
7a27a9abbb59a0b4b4271d5836bfaf7b28fc3a8aa18ce36c12a726fa217797d2ea5230e6536ca36029c2f2ab11dc8d9997bb659855f723adbf860bfcb97222ca
-
SSDEEP
3072:gR4jdNqTqHL+3phRrbhsEExMusExvQF4ExM0ExMt:eafYphYq
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 10 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened (read-only) \??\O: 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened (read-only) \??\E: 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened (read-only) \??\H: 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened (read-only) \??\J: 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened (read-only) \??\L: 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened (read-only) \??\G: 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened (read-only) \??\I: 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened (read-only) \??\K: 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened (read-only) \??\M: 240f743d0aa82d668e5a37d6af222da2_JC.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Themes\\TranscodedWallpaper.jpg" 240f743d0aa82d668e5a37d6af222da2_JC.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\RCXA623.tmp 240f743d0aa82d668e5a37d6af222da2_JC.exe File created C:\Program Files\DVD Maker\DVDMaker.exe 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\DVD Maker\RCXA795.tmp 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\DVD Maker\RCXA7B8.tmp 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCXA928.tmp 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe 240f743d0aa82d668e5a37d6af222da2_JC.exe File created C:\Program Files\7-Zip\7z.cab 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\7-Zip\RCXA601.tmp 240f743d0aa82d668e5a37d6af222da2_JC.exe File created C:\Program Files\Google\Chrome\Application\chrome_proxy.exe 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCXA9AC.tmp 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\FlickLearningWizard.cab 240f743d0aa82d668e5a37d6af222da2_JC.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\FlickLearningWizard.exe 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\RCXA6D6.tmp 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCXA907.tmp 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\RCXA673.tmp 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\RCXA674.tmp 240f743d0aa82d668e5a37d6af222da2_JC.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.cab 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\RCXA9DE.tmp 240f743d0aa82d668e5a37d6af222da2_JC.exe File created C:\Program Files\7-Zip\7zFM.exe 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ConvertInkStore.exe 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\DVD Maker\RCXA7D8.tmp 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.cab 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCXA8F7.tmp 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCXA94A.tmp 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\RCXA9DC.tmp 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\7-Zip\7z.cab 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\7-Zip\RCXA5D2.tmp 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\RCXA9DD.tmp 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCXA8E5.tmp 240f743d0aa82d668e5a37d6af222da2_JC.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\7-Zip\RCXA624.tmp 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\RCXA6D5.tmp 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\FlickLearningWizard.exe 240f743d0aa82d668e5a37d6af222da2_JC.exe File created C:\Program Files\DVD Maker\DVDMaker.cab 240f743d0aa82d668e5a37d6af222da2_JC.exe File created C:\Program Files\Google\Chrome\Application\chrome.cab 240f743d0aa82d668e5a37d6af222da2_JC.exe File created C:\Program Files\7-Zip\7z.exe 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\7-Zip\7zFM.cab 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\7-Zip\7z.exe 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCXA8F6.tmp 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCXA8E4.tmp 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCXA95C.tmp 240f743d0aa82d668e5a37d6af222da2_JC.exe File created C:\Program Files\Google\Chrome\Application\chrome_proxy.cab 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCXA9AB.tmp 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\7-Zip\RCXA5D1.tmp 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\DVD Maker\RCXA7A6.tmp 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.cab 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\7-Zip\RCXA622.tmp 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.cab 240f743d0aa82d668e5a37d6af222da2_JC.exe File created C:\Program Files\readme.1xt 240f743d0aa82d668e5a37d6af222da2_JC.exe File created C:\Program Files\7-Zip\7zFM.cab 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCXA918.tmp 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\RCXA6D4.tmp 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\RCXA6E7.tmp 240f743d0aa82d668e5a37d6af222da2_JC.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ConvertInkStore.exe 240f743d0aa82d668e5a37d6af222da2_JC.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\FlickLearningWizard.cab 240f743d0aa82d668e5a37d6af222da2_JC.exe File created C:\Program Files\Google\Chrome\Application\chrome.exe 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCXA94B.tmp 240f743d0aa82d668e5a37d6af222da2_JC.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ConvertInkStore.cab 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ConvertInkStore.cab 240f743d0aa82d668e5a37d6af222da2_JC.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.cab 240f743d0aa82d668e5a37d6af222da2_JC.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\windows\readme.1xt 240f743d0aa82d668e5a37d6af222da2_JC.exe File created C:\windows\WallPapers.jpg 240f743d0aa82d668e5a37d6af222da2_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1336 1100 WerFault.exe 27 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Desktop\General 240f743d0aa82d668e5a37d6af222da2_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Desktop\General\WallpaperSource = "C:\\windows\\WallPapers.jpg" 240f743d0aa82d668e5a37d6af222da2_JC.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1100 wrote to memory of 1336 1100 240f743d0aa82d668e5a37d6af222da2_JC.exe 28 PID 1100 wrote to memory of 1336 1100 240f743d0aa82d668e5a37d6af222da2_JC.exe 28 PID 1100 wrote to memory of 1336 1100 240f743d0aa82d668e5a37d6af222da2_JC.exe 28 PID 1100 wrote to memory of 1336 1100 240f743d0aa82d668e5a37d6af222da2_JC.exe 28 PID 1100 wrote to memory of 1336 1100 240f743d0aa82d668e5a37d6af222da2_JC.exe 28 PID 1100 wrote to memory of 1336 1100 240f743d0aa82d668e5a37d6af222da2_JC.exe 28 PID 1100 wrote to memory of 1336 1100 240f743d0aa82d668e5a37d6af222da2_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\240f743d0aa82d668e5a37d6af222da2_JC.exe"C:\Users\Admin\AppData\Local\Temp\240f743d0aa82d668e5a37d6af222da2_JC.exe"1⤵
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1100 -s 9922⤵
- Program crash
PID:1336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
206KB
MD59ac3d2227fe7de561da03ea2343ad268
SHA14ac4edda5056277e6f9e1a3db111b2d22d4b605a
SHA256d1fd5bba538733d5a4628a6d7206c1fd3773ef2cf318341cf9c4ddc5512ef3fe
SHA51259b639573804026b4f6a2dd6c34739f61826258ed9c985fa974754112d7ad1a9e38cb8b91456b23b7310cf336c2654cb39a819bf94029127e2b10e3d112051e4
-
Filesize
847KB
MD5c8f40f25f783a52262bdaedeb5555427
SHA1e45e198607c8d7398745baa71780e3e7a2f6deca
SHA256e81b44ee7381ae3b630488b6fb7e3d9ffbdd9ac3032181d4ccaaff3409b57316
SHA512f5944743f54028eb1dd0f2d68468726b177d33185324da0da96cdd20768bab4ca2e507ae9157b2733fd6240c920b7e15a5f5b9f284ee09d0fd385fc895b97191
-
Filesize
1.5MB
MD53fcb12185041202bf94d6d6d3b023751
SHA13c27d9655d22c7b04aba4ff7fbbf05be09126e88
SHA256ac4c0013993c72705069eaca74537947fde298bb77a2152fdb2577790f892f37
SHA512bd9137ff601f911906a633f4965eba5e14a95f6ff581a885a738ff19c40e9524dc9488cd4e15cbf15237d1e02896ccebcfe32b5697910b15cab458b2b76a0a51
-
Filesize
188KB
MD5f03cd3c73a4d56421c60e6f2a40a9ef2
SHA13e7b8c15ba83c23333740af3aa4c4b3066fe5173
SHA25644fc47dc280a196cc49849cfb770030f1525758ba266330b6232ee60fb4fe642
SHA512ba57d32ffe4d0ecca137aed733c1471b4663dcba07a4c4fffcffc008a051de86fd8561bdd93d5fff545bf1865c8b5ac71eae31d20228727f5c1a46f2f9a6390e
-
Filesize
906KB
MD584ff6c209447a056e22a29806bfa2c96
SHA121190928955094c44ad996f26c801b46437809cc
SHA256d2072ffe011341ec2a3c4af9f93b06deffa92fa05120c45dbb3ad5635f3e57b1
SHA5126493dfbe43887e6a588ef067960ddb9e9798e07bb14fd73abf99acc5ee63250858c86d70a926f009f466bf6fedb7ca43bbecf7fc2433e47704527c2d0b6b01d9
-
Filesize
2.2MB
MD5e83d2495d5867e224fbf42ef40d8856c
SHA1fec908e0e7bc469875ab8f68d936225c635a6ac2
SHA2562c806d9b932f24c4bc84e86ced7962a75c0161ff732f77eb1827a3a14976b2c1
SHA512e22f36cb40fff2672e9e49aa991656a0cc1188c7ba2583efae2d238a4e864bd5f8bdc532a5c35285ca2b4b105097454eb06d5860c41e618c44bab6e300408b8d
-
Filesize
2.2MB
MD5f56161efdeee267a188bb1800c725c04
SHA19f5cf40f112be8cc27fd10186bfa9b58191e36c2
SHA256dc3fcaf700b8105152f362d6b32ad161289753f8a55039eeea81cfcbd6ddff4d
SHA51227f3928be8380909c4b83578d2adf1b0fa3677f494a83585ad2db5a41ee1319bc205bd97f2180253ca30503200934284471043d7eebd86acf3bbc27219e92398
-
Filesize
1.6MB
MD5527e039ba9add8a7fac3a6bc30a6d476
SHA1729a329265eda72cada039c1941e7c672addfc19
SHA2564b8a72fc81b733ed2e6e70d4c5401f954002783dbf14927849ad579860780b94
SHA5129e73e14e33a5f07a87e9c1fecfdaee09d1408471052aacfde3d1e877dad4d253b525ebefca6bddabc23cf81d8dcce0785aedcc2f135d171ecbb1feaeb922c449
-
Filesize
2.8MB
MD5095092f4e746810c5829038d48afd55a
SHA1246eb3d41194dddc826049bbafeb6fc522ec044a
SHA2562f606012843d144610dc7be55d1716d5d106cbc6acbce57561dc0e62c38b8588
SHA5127f36fc03bfed0f3cf6ac3406c819993bf995e4f8c26a7589e9032c14b5a9c7048f5567f77b3b15f946c5282fc0be6308a92eab7879332d74c400d0c139ce8400
-
Filesize
303KB
MD50675bc368c30091dc46a9cc9ca35d038
SHA127763fb05f1411ecaddebea976f1ba4acdb48cf3
SHA2568a77bab2ee007285794b52c3a80a3fb4db729eaabc78506e92a2411c55a77612
SHA5121d47c8f248b185d69a67e1f648ee00cec824e316c6a1157257fdccf34f4350a32d8ad41e7a87890aa50018aa85bb5b387900062eb933c908026ebec752674f08
-
Filesize
304KB
MD5b99b189b1ddcde6f711ca351334e46d1
SHA156a4747b4410aaebb54c175f05bc837294b1e46d
SHA2562402f06a2da70b3b4edf7ce33e3e5982f5b3fab2089eb8caf04117b543fc8ad8
SHA512ce6242486551640b32dfaee10b1c75b95e1bb5832b27afdc703fdf17fe7df647ff1fc1f4ac7f08d154c90b0502f6106329d137a5d954832d5854be7f9f56ed15
-
Filesize
378KB
MD58dee350a303b034fc5b8fc9b663ca1aa
SHA1f60f303bed754a3a39e18d4aa3547f8fde657978
SHA25653167fccec07e001a74e589ecdc49a77441f995004074247afe2e23848b3953f
SHA5125ddd26e99a7eefb599e78a2cdcf432daf21e419e927ca20dd8f64c4b2b275ac7c1ddd9821e432e1f11d9d243fafa02f169c5b1f4c97d14c5ea824818e9a3d58f
-
Filesize
334KB
MD5a6f3ee3b05246029e69e92b5f236ded7
SHA17f1e5389f2678fc2e31eaa0755f1a547205630d7
SHA256cce2f94dcb2cb5a839f5660e91d99d78053f7a16ae8ef694c250658cd6955acd
SHA5129e4cd2a48dce39e9ac82ecf47905137ff03af24c6070ab3ce54d7cdbd39b8bbe70ec44066263c2e08daba47f4cdd9ea5adcf28605696ec997701fe9148179ffb
-
Filesize
1020KB
MD5b65d7344b0a7faa207d2e1a7adaafb60
SHA1755ad15b1745b0e730d658d4a92e2b754425b7db
SHA256f4b91fbbcba8a46eefe4965e4a24c6ede3decbd1fec96e141a1953173efd1c92
SHA512f17ac73c2df7c73a31b11ce0f533d6db91bdb0cdeea653dcd52ac72c3cf28da0c236b79586ddc7a6c825fdd171290722f888465e776f12ac2cae75be82726b22
-
Filesize
135KB
MD5f6fae93cd1b1c4d2bd224ca84991c3c0
SHA15aea6ea184eec02d168303f26e1de59013fc806e
SHA256a4bf5bd94f9ee7d49eb1fbfe4c604b246042642df7aee2cce4b2a354fdc0b76e
SHA512208476ca96c175336beb22fc53d42ada798f1c50c935357fed4c844a7bb2b0e07dedb5476aa82b1d8ba56ef0d65dd2cfc388fa11f704d9bacaa2309732551650