Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 17:41

General

  • Target

    6656bbee59c5f83b6d5208a0e90d76869ab0c6d8bf5d2cd1c8f347898791e88b_JC.exe

  • Size

    1.1MB

  • MD5

    236156bed59fe2253b4dfd15ff20dad1

  • SHA1

    a7aa1772b981f79cf7e8fbdcdf1afb92e33e4c22

  • SHA256

    6656bbee59c5f83b6d5208a0e90d76869ab0c6d8bf5d2cd1c8f347898791e88b

  • SHA512

    59ce9a3f7884a74cd2dcb15b778fb61177f22e02ee148d484b6e1401a86306948fb0b96997d5345e267e0f69c84f29670fae5804f407647ef54fae6b7d5ebc50

  • SSDEEP

    24576:WyrUud0enDD5KaOeheozi8v059jtv9Omw45/usRvMDO/nfz222TqHdi:lAuuenDD5hOe33059ZzMCqzTqHd

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6656bbee59c5f83b6d5208a0e90d76869ab0c6d8bf5d2cd1c8f347898791e88b_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\6656bbee59c5f83b6d5208a0e90d76869ab0c6d8bf5d2cd1c8f347898791e88b_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2116
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yk6Hy92.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yk6Hy92.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1680
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\OL8nD16.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\OL8nD16.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1732
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\IZ5kr52.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\IZ5kr52.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2180
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1gL13HV8.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1gL13HV8.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2240
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2kO6476.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2kO6476.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2616
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2548
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 268
                7⤵
                • Program crash
                PID:2460
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 284
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yk6Hy92.exe

    Filesize

    1.0MB

    MD5

    b29828e84ad20d3717757a6d92d48349

    SHA1

    06102dd99bdd6f49dadec8e5fcebd612ec151996

    SHA256

    ba99dac527c4a88d922f4499b49d9078cf4bd838c22cee3152983492da97e047

    SHA512

    9435e40d97e4e113c3f8b8109d0d726dca32aa06408c9f39850e3c566651e1ab49750fa159b9bc453e3e9a66012218ac0dca825f811a1b20a5a4b20985c005bc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yk6Hy92.exe

    Filesize

    1.0MB

    MD5

    b29828e84ad20d3717757a6d92d48349

    SHA1

    06102dd99bdd6f49dadec8e5fcebd612ec151996

    SHA256

    ba99dac527c4a88d922f4499b49d9078cf4bd838c22cee3152983492da97e047

    SHA512

    9435e40d97e4e113c3f8b8109d0d726dca32aa06408c9f39850e3c566651e1ab49750fa159b9bc453e3e9a66012218ac0dca825f811a1b20a5a4b20985c005bc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\OL8nD16.exe

    Filesize

    733KB

    MD5

    5dda28e29ae24442e511a76435c27d33

    SHA1

    3903d1afb7fab5939bcb7e24f5458a68b554df20

    SHA256

    7ae2ca76785e15df22bf247bea5287d4477e32f7aa2b5727bf94db9a3659b8ca

    SHA512

    d25dd59c669d77a4013e06e5292e40d33f3c7677c6c0b039d3e8d2a2d98e7c9b4e09e54473c09f4c01ce8dcd6ccfe0d11ec26834bf46ddff0f8344501a40ad72

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\OL8nD16.exe

    Filesize

    733KB

    MD5

    5dda28e29ae24442e511a76435c27d33

    SHA1

    3903d1afb7fab5939bcb7e24f5458a68b554df20

    SHA256

    7ae2ca76785e15df22bf247bea5287d4477e32f7aa2b5727bf94db9a3659b8ca

    SHA512

    d25dd59c669d77a4013e06e5292e40d33f3c7677c6c0b039d3e8d2a2d98e7c9b4e09e54473c09f4c01ce8dcd6ccfe0d11ec26834bf46ddff0f8344501a40ad72

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\IZ5kr52.exe

    Filesize

    485KB

    MD5

    3a04af6196010999a3e381398acf5f64

    SHA1

    2d85e13d1b783c1185a2b2d67ea77fddefacd1ef

    SHA256

    5aa26458d6c867968547877ba42af94d8b954f9202d3871332f33af919dbb15e

    SHA512

    3262e27e7339c9774994a911f1145911ff843c16c52de2589439e1ffd0dd992fd9ab59bb0c3d9424e8f014b47f5c0d26720f283477aa4be32c9bf5451c63fc42

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\IZ5kr52.exe

    Filesize

    485KB

    MD5

    3a04af6196010999a3e381398acf5f64

    SHA1

    2d85e13d1b783c1185a2b2d67ea77fddefacd1ef

    SHA256

    5aa26458d6c867968547877ba42af94d8b954f9202d3871332f33af919dbb15e

    SHA512

    3262e27e7339c9774994a911f1145911ff843c16c52de2589439e1ffd0dd992fd9ab59bb0c3d9424e8f014b47f5c0d26720f283477aa4be32c9bf5451c63fc42

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1gL13HV8.exe

    Filesize

    194KB

    MD5

    35d718538c3e1346cb4fcf54aaa0f141

    SHA1

    234c0aa0465c27c190a83936e8e3aa3c4b991224

    SHA256

    97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

    SHA512

    4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1gL13HV8.exe

    Filesize

    194KB

    MD5

    35d718538c3e1346cb4fcf54aaa0f141

    SHA1

    234c0aa0465c27c190a83936e8e3aa3c4b991224

    SHA256

    97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

    SHA512

    4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2kO6476.exe

    Filesize

    432KB

    MD5

    018faddeffb4b5c7a7e30467b47e5bef

    SHA1

    cce5d817cb7b5cb1322f170a6b22baf1cc8cf24d

    SHA256

    c7c174f843c9cb09b2fbe544ef95ed2b7d3ca22cf43038ccbefd151292791b1f

    SHA512

    fe90115d6473f98f58cbbc982a96bf8134e1e39e628afdf58d67ec6f33974fc214eab6e915a65cad669602f4e9e2882e1e529f0e484ecab6feaf737a0919f7e3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2kO6476.exe

    Filesize

    432KB

    MD5

    018faddeffb4b5c7a7e30467b47e5bef

    SHA1

    cce5d817cb7b5cb1322f170a6b22baf1cc8cf24d

    SHA256

    c7c174f843c9cb09b2fbe544ef95ed2b7d3ca22cf43038ccbefd151292791b1f

    SHA512

    fe90115d6473f98f58cbbc982a96bf8134e1e39e628afdf58d67ec6f33974fc214eab6e915a65cad669602f4e9e2882e1e529f0e484ecab6feaf737a0919f7e3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2kO6476.exe

    Filesize

    432KB

    MD5

    018faddeffb4b5c7a7e30467b47e5bef

    SHA1

    cce5d817cb7b5cb1322f170a6b22baf1cc8cf24d

    SHA256

    c7c174f843c9cb09b2fbe544ef95ed2b7d3ca22cf43038ccbefd151292791b1f

    SHA512

    fe90115d6473f98f58cbbc982a96bf8134e1e39e628afdf58d67ec6f33974fc214eab6e915a65cad669602f4e9e2882e1e529f0e484ecab6feaf737a0919f7e3

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\yk6Hy92.exe

    Filesize

    1.0MB

    MD5

    b29828e84ad20d3717757a6d92d48349

    SHA1

    06102dd99bdd6f49dadec8e5fcebd612ec151996

    SHA256

    ba99dac527c4a88d922f4499b49d9078cf4bd838c22cee3152983492da97e047

    SHA512

    9435e40d97e4e113c3f8b8109d0d726dca32aa06408c9f39850e3c566651e1ab49750fa159b9bc453e3e9a66012218ac0dca825f811a1b20a5a4b20985c005bc

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\yk6Hy92.exe

    Filesize

    1.0MB

    MD5

    b29828e84ad20d3717757a6d92d48349

    SHA1

    06102dd99bdd6f49dadec8e5fcebd612ec151996

    SHA256

    ba99dac527c4a88d922f4499b49d9078cf4bd838c22cee3152983492da97e047

    SHA512

    9435e40d97e4e113c3f8b8109d0d726dca32aa06408c9f39850e3c566651e1ab49750fa159b9bc453e3e9a66012218ac0dca825f811a1b20a5a4b20985c005bc

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\OL8nD16.exe

    Filesize

    733KB

    MD5

    5dda28e29ae24442e511a76435c27d33

    SHA1

    3903d1afb7fab5939bcb7e24f5458a68b554df20

    SHA256

    7ae2ca76785e15df22bf247bea5287d4477e32f7aa2b5727bf94db9a3659b8ca

    SHA512

    d25dd59c669d77a4013e06e5292e40d33f3c7677c6c0b039d3e8d2a2d98e7c9b4e09e54473c09f4c01ce8dcd6ccfe0d11ec26834bf46ddff0f8344501a40ad72

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\OL8nD16.exe

    Filesize

    733KB

    MD5

    5dda28e29ae24442e511a76435c27d33

    SHA1

    3903d1afb7fab5939bcb7e24f5458a68b554df20

    SHA256

    7ae2ca76785e15df22bf247bea5287d4477e32f7aa2b5727bf94db9a3659b8ca

    SHA512

    d25dd59c669d77a4013e06e5292e40d33f3c7677c6c0b039d3e8d2a2d98e7c9b4e09e54473c09f4c01ce8dcd6ccfe0d11ec26834bf46ddff0f8344501a40ad72

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\IZ5kr52.exe

    Filesize

    485KB

    MD5

    3a04af6196010999a3e381398acf5f64

    SHA1

    2d85e13d1b783c1185a2b2d67ea77fddefacd1ef

    SHA256

    5aa26458d6c867968547877ba42af94d8b954f9202d3871332f33af919dbb15e

    SHA512

    3262e27e7339c9774994a911f1145911ff843c16c52de2589439e1ffd0dd992fd9ab59bb0c3d9424e8f014b47f5c0d26720f283477aa4be32c9bf5451c63fc42

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\IZ5kr52.exe

    Filesize

    485KB

    MD5

    3a04af6196010999a3e381398acf5f64

    SHA1

    2d85e13d1b783c1185a2b2d67ea77fddefacd1ef

    SHA256

    5aa26458d6c867968547877ba42af94d8b954f9202d3871332f33af919dbb15e

    SHA512

    3262e27e7339c9774994a911f1145911ff843c16c52de2589439e1ffd0dd992fd9ab59bb0c3d9424e8f014b47f5c0d26720f283477aa4be32c9bf5451c63fc42

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1gL13HV8.exe

    Filesize

    194KB

    MD5

    35d718538c3e1346cb4fcf54aaa0f141

    SHA1

    234c0aa0465c27c190a83936e8e3aa3c4b991224

    SHA256

    97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

    SHA512

    4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1gL13HV8.exe

    Filesize

    194KB

    MD5

    35d718538c3e1346cb4fcf54aaa0f141

    SHA1

    234c0aa0465c27c190a83936e8e3aa3c4b991224

    SHA256

    97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

    SHA512

    4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2kO6476.exe

    Filesize

    432KB

    MD5

    018faddeffb4b5c7a7e30467b47e5bef

    SHA1

    cce5d817cb7b5cb1322f170a6b22baf1cc8cf24d

    SHA256

    c7c174f843c9cb09b2fbe544ef95ed2b7d3ca22cf43038ccbefd151292791b1f

    SHA512

    fe90115d6473f98f58cbbc982a96bf8134e1e39e628afdf58d67ec6f33974fc214eab6e915a65cad669602f4e9e2882e1e529f0e484ecab6feaf737a0919f7e3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2kO6476.exe

    Filesize

    432KB

    MD5

    018faddeffb4b5c7a7e30467b47e5bef

    SHA1

    cce5d817cb7b5cb1322f170a6b22baf1cc8cf24d

    SHA256

    c7c174f843c9cb09b2fbe544ef95ed2b7d3ca22cf43038ccbefd151292791b1f

    SHA512

    fe90115d6473f98f58cbbc982a96bf8134e1e39e628afdf58d67ec6f33974fc214eab6e915a65cad669602f4e9e2882e1e529f0e484ecab6feaf737a0919f7e3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2kO6476.exe

    Filesize

    432KB

    MD5

    018faddeffb4b5c7a7e30467b47e5bef

    SHA1

    cce5d817cb7b5cb1322f170a6b22baf1cc8cf24d

    SHA256

    c7c174f843c9cb09b2fbe544ef95ed2b7d3ca22cf43038ccbefd151292791b1f

    SHA512

    fe90115d6473f98f58cbbc982a96bf8134e1e39e628afdf58d67ec6f33974fc214eab6e915a65cad669602f4e9e2882e1e529f0e484ecab6feaf737a0919f7e3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2kO6476.exe

    Filesize

    432KB

    MD5

    018faddeffb4b5c7a7e30467b47e5bef

    SHA1

    cce5d817cb7b5cb1322f170a6b22baf1cc8cf24d

    SHA256

    c7c174f843c9cb09b2fbe544ef95ed2b7d3ca22cf43038ccbefd151292791b1f

    SHA512

    fe90115d6473f98f58cbbc982a96bf8134e1e39e628afdf58d67ec6f33974fc214eab6e915a65cad669602f4e9e2882e1e529f0e484ecab6feaf737a0919f7e3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2kO6476.exe

    Filesize

    432KB

    MD5

    018faddeffb4b5c7a7e30467b47e5bef

    SHA1

    cce5d817cb7b5cb1322f170a6b22baf1cc8cf24d

    SHA256

    c7c174f843c9cb09b2fbe544ef95ed2b7d3ca22cf43038ccbefd151292791b1f

    SHA512

    fe90115d6473f98f58cbbc982a96bf8134e1e39e628afdf58d67ec6f33974fc214eab6e915a65cad669602f4e9e2882e1e529f0e484ecab6feaf737a0919f7e3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2kO6476.exe

    Filesize

    432KB

    MD5

    018faddeffb4b5c7a7e30467b47e5bef

    SHA1

    cce5d817cb7b5cb1322f170a6b22baf1cc8cf24d

    SHA256

    c7c174f843c9cb09b2fbe544ef95ed2b7d3ca22cf43038ccbefd151292791b1f

    SHA512

    fe90115d6473f98f58cbbc982a96bf8134e1e39e628afdf58d67ec6f33974fc214eab6e915a65cad669602f4e9e2882e1e529f0e484ecab6feaf737a0919f7e3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2kO6476.exe

    Filesize

    432KB

    MD5

    018faddeffb4b5c7a7e30467b47e5bef

    SHA1

    cce5d817cb7b5cb1322f170a6b22baf1cc8cf24d

    SHA256

    c7c174f843c9cb09b2fbe544ef95ed2b7d3ca22cf43038ccbefd151292791b1f

    SHA512

    fe90115d6473f98f58cbbc982a96bf8134e1e39e628afdf58d67ec6f33974fc214eab6e915a65cad669602f4e9e2882e1e529f0e484ecab6feaf737a0919f7e3

  • memory/2240-57-0x00000000005D0000-0x00000000005E6000-memory.dmp

    Filesize

    88KB

  • memory/2240-51-0x00000000005D0000-0x00000000005E6000-memory.dmp

    Filesize

    88KB

  • memory/2240-63-0x00000000005D0000-0x00000000005E6000-memory.dmp

    Filesize

    88KB

  • memory/2240-67-0x00000000005D0000-0x00000000005E6000-memory.dmp

    Filesize

    88KB

  • memory/2240-69-0x00000000005D0000-0x00000000005E6000-memory.dmp

    Filesize

    88KB

  • memory/2240-65-0x00000000005D0000-0x00000000005E6000-memory.dmp

    Filesize

    88KB

  • memory/2240-61-0x00000000005D0000-0x00000000005E6000-memory.dmp

    Filesize

    88KB

  • memory/2240-55-0x00000000005D0000-0x00000000005E6000-memory.dmp

    Filesize

    88KB

  • memory/2240-53-0x00000000005D0000-0x00000000005E6000-memory.dmp

    Filesize

    88KB

  • memory/2240-43-0x00000000005D0000-0x00000000005E6000-memory.dmp

    Filesize

    88KB

  • memory/2240-49-0x00000000005D0000-0x00000000005E6000-memory.dmp

    Filesize

    88KB

  • memory/2240-47-0x00000000005D0000-0x00000000005E6000-memory.dmp

    Filesize

    88KB

  • memory/2240-45-0x00000000005D0000-0x00000000005E6000-memory.dmp

    Filesize

    88KB

  • memory/2240-59-0x00000000005D0000-0x00000000005E6000-memory.dmp

    Filesize

    88KB

  • memory/2240-40-0x0000000000540000-0x000000000055E000-memory.dmp

    Filesize

    120KB

  • memory/2240-41-0x00000000005D0000-0x00000000005EC000-memory.dmp

    Filesize

    112KB

  • memory/2240-42-0x00000000005D0000-0x00000000005E6000-memory.dmp

    Filesize

    88KB

  • memory/2548-79-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2548-84-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2548-86-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2548-85-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2548-90-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2548-88-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2548-83-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2548-82-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2548-81-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2548-80-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB