Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 18:22

General

  • Target

    e59f66599083592597d4854b3f810eb1b7379ab10797365d701cf564ede63190_JC.exe

  • Size

    1.1MB

  • MD5

    604b2edf4f293e84fc764d9d0a273aff

  • SHA1

    9d5e5846c24299a7ca7550beb15268793ad772bc

  • SHA256

    e59f66599083592597d4854b3f810eb1b7379ab10797365d701cf564ede63190

  • SHA512

    2480b6a3ebc5ab52034af762c88af4085935407b041154730c02d8692f38584e3e1755bb0f6c315d66cbb81f0efd6bbf6a72837790fcb6d7cc75a98395f05b9f

  • SSDEEP

    24576:lywd9FWtTezlmPv78R9qTtEBxiwoIkzoYgNP:A+FWoZ078RJxiSqoYg

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e59f66599083592597d4854b3f810eb1b7379ab10797365d701cf564ede63190_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\e59f66599083592597d4854b3f810eb1b7379ab10797365d701cf564ede63190_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1100
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Sj5dt63.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Sj5dt63.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2068
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Va0RA73.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Va0RA73.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1688
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hK5Bq46.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hK5Bq46.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1648
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1YG58bV6.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1YG58bV6.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2948
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2uU6050.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2uU6050.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2352
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:2448
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2352 -s 284
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:2896

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Sj5dt63.exe

      Filesize

      1.0MB

      MD5

      a6f002d38888bc44956d1f005ada311c

      SHA1

      1b95dd7dab4b671bd29fc8b9de4f28cf6be4c997

      SHA256

      589fea3a10f7d0566700488044dc89199136c22b4b298e3edb60ddce09e00b03

      SHA512

      58d1fe8c6a9abfacfde428a768ea5d510b7d00c95eb69b8dfb91afc4947d3ad52d1cd5d52fd594a60b6a916a97ff2e1a546eeccfda709b0d84b6481fffeb132f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Sj5dt63.exe

      Filesize

      1.0MB

      MD5

      a6f002d38888bc44956d1f005ada311c

      SHA1

      1b95dd7dab4b671bd29fc8b9de4f28cf6be4c997

      SHA256

      589fea3a10f7d0566700488044dc89199136c22b4b298e3edb60ddce09e00b03

      SHA512

      58d1fe8c6a9abfacfde428a768ea5d510b7d00c95eb69b8dfb91afc4947d3ad52d1cd5d52fd594a60b6a916a97ff2e1a546eeccfda709b0d84b6481fffeb132f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Va0RA73.exe

      Filesize

      734KB

      MD5

      18e6861053ded36523374b5c205b428b

      SHA1

      682f7f68204fcb5c873e986a0952e7a45fba0ee5

      SHA256

      7d31ae1f8d7a7039ef90f8cceffd71266815735aaf4d423a04377a23e925fc65

      SHA512

      20701643e532b9864ea5e308f4bc92b401501e394a9cd5485f74daee9a0cf5100dacd1657f2d3a0b83958e78a80aab532849c77d5d79cce0673a0a8bdd15695f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Va0RA73.exe

      Filesize

      734KB

      MD5

      18e6861053ded36523374b5c205b428b

      SHA1

      682f7f68204fcb5c873e986a0952e7a45fba0ee5

      SHA256

      7d31ae1f8d7a7039ef90f8cceffd71266815735aaf4d423a04377a23e925fc65

      SHA512

      20701643e532b9864ea5e308f4bc92b401501e394a9cd5485f74daee9a0cf5100dacd1657f2d3a0b83958e78a80aab532849c77d5d79cce0673a0a8bdd15695f

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hK5Bq46.exe

      Filesize

      485KB

      MD5

      517daec6c5802163b2064c1ae3d59afe

      SHA1

      e2819b801b2ef64cfec128cece053db10754991b

      SHA256

      4dce8615daa84ead6b90bdd116bc5b772e0849ea7ff8c1ead1a1c3357a1f0276

      SHA512

      ce17ca1a806521922ac19238b5d9c9a09098133789d8cf1a305756f0047923e07854ec9a00ff9359c570ee34ccc1f97b85db50c54cdd82615f142a7e5caf4029

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hK5Bq46.exe

      Filesize

      485KB

      MD5

      517daec6c5802163b2064c1ae3d59afe

      SHA1

      e2819b801b2ef64cfec128cece053db10754991b

      SHA256

      4dce8615daa84ead6b90bdd116bc5b772e0849ea7ff8c1ead1a1c3357a1f0276

      SHA512

      ce17ca1a806521922ac19238b5d9c9a09098133789d8cf1a305756f0047923e07854ec9a00ff9359c570ee34ccc1f97b85db50c54cdd82615f142a7e5caf4029

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1YG58bV6.exe

      Filesize

      194KB

      MD5

      35d718538c3e1346cb4fcf54aaa0f141

      SHA1

      234c0aa0465c27c190a83936e8e3aa3c4b991224

      SHA256

      97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

      SHA512

      4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1YG58bV6.exe

      Filesize

      194KB

      MD5

      35d718538c3e1346cb4fcf54aaa0f141

      SHA1

      234c0aa0465c27c190a83936e8e3aa3c4b991224

      SHA256

      97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

      SHA512

      4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2uU6050.exe

      Filesize

      432KB

      MD5

      4cebbfa84ddc34fa1c231c04fe2fdf27

      SHA1

      985659dc4f2adf11123d075c94145f442565da51

      SHA256

      df444c2087c0e3ce9c8ab639da32021dc18555cde059968b08fe941ead756d26

      SHA512

      dcf3537741054e2d3024b8435026314dc869983f80410fcdec32216c7e7f81a2a6818283b3c96f0a6d4cc49f6211b3facf7dd3bcc486eda174f7e6650864fe11

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2uU6050.exe

      Filesize

      432KB

      MD5

      4cebbfa84ddc34fa1c231c04fe2fdf27

      SHA1

      985659dc4f2adf11123d075c94145f442565da51

      SHA256

      df444c2087c0e3ce9c8ab639da32021dc18555cde059968b08fe941ead756d26

      SHA512

      dcf3537741054e2d3024b8435026314dc869983f80410fcdec32216c7e7f81a2a6818283b3c96f0a6d4cc49f6211b3facf7dd3bcc486eda174f7e6650864fe11

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2uU6050.exe

      Filesize

      432KB

      MD5

      4cebbfa84ddc34fa1c231c04fe2fdf27

      SHA1

      985659dc4f2adf11123d075c94145f442565da51

      SHA256

      df444c2087c0e3ce9c8ab639da32021dc18555cde059968b08fe941ead756d26

      SHA512

      dcf3537741054e2d3024b8435026314dc869983f80410fcdec32216c7e7f81a2a6818283b3c96f0a6d4cc49f6211b3facf7dd3bcc486eda174f7e6650864fe11

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Sj5dt63.exe

      Filesize

      1.0MB

      MD5

      a6f002d38888bc44956d1f005ada311c

      SHA1

      1b95dd7dab4b671bd29fc8b9de4f28cf6be4c997

      SHA256

      589fea3a10f7d0566700488044dc89199136c22b4b298e3edb60ddce09e00b03

      SHA512

      58d1fe8c6a9abfacfde428a768ea5d510b7d00c95eb69b8dfb91afc4947d3ad52d1cd5d52fd594a60b6a916a97ff2e1a546eeccfda709b0d84b6481fffeb132f

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Sj5dt63.exe

      Filesize

      1.0MB

      MD5

      a6f002d38888bc44956d1f005ada311c

      SHA1

      1b95dd7dab4b671bd29fc8b9de4f28cf6be4c997

      SHA256

      589fea3a10f7d0566700488044dc89199136c22b4b298e3edb60ddce09e00b03

      SHA512

      58d1fe8c6a9abfacfde428a768ea5d510b7d00c95eb69b8dfb91afc4947d3ad52d1cd5d52fd594a60b6a916a97ff2e1a546eeccfda709b0d84b6481fffeb132f

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\Va0RA73.exe

      Filesize

      734KB

      MD5

      18e6861053ded36523374b5c205b428b

      SHA1

      682f7f68204fcb5c873e986a0952e7a45fba0ee5

      SHA256

      7d31ae1f8d7a7039ef90f8cceffd71266815735aaf4d423a04377a23e925fc65

      SHA512

      20701643e532b9864ea5e308f4bc92b401501e394a9cd5485f74daee9a0cf5100dacd1657f2d3a0b83958e78a80aab532849c77d5d79cce0673a0a8bdd15695f

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\Va0RA73.exe

      Filesize

      734KB

      MD5

      18e6861053ded36523374b5c205b428b

      SHA1

      682f7f68204fcb5c873e986a0952e7a45fba0ee5

      SHA256

      7d31ae1f8d7a7039ef90f8cceffd71266815735aaf4d423a04377a23e925fc65

      SHA512

      20701643e532b9864ea5e308f4bc92b401501e394a9cd5485f74daee9a0cf5100dacd1657f2d3a0b83958e78a80aab532849c77d5d79cce0673a0a8bdd15695f

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\hK5Bq46.exe

      Filesize

      485KB

      MD5

      517daec6c5802163b2064c1ae3d59afe

      SHA1

      e2819b801b2ef64cfec128cece053db10754991b

      SHA256

      4dce8615daa84ead6b90bdd116bc5b772e0849ea7ff8c1ead1a1c3357a1f0276

      SHA512

      ce17ca1a806521922ac19238b5d9c9a09098133789d8cf1a305756f0047923e07854ec9a00ff9359c570ee34ccc1f97b85db50c54cdd82615f142a7e5caf4029

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\hK5Bq46.exe

      Filesize

      485KB

      MD5

      517daec6c5802163b2064c1ae3d59afe

      SHA1

      e2819b801b2ef64cfec128cece053db10754991b

      SHA256

      4dce8615daa84ead6b90bdd116bc5b772e0849ea7ff8c1ead1a1c3357a1f0276

      SHA512

      ce17ca1a806521922ac19238b5d9c9a09098133789d8cf1a305756f0047923e07854ec9a00ff9359c570ee34ccc1f97b85db50c54cdd82615f142a7e5caf4029

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1YG58bV6.exe

      Filesize

      194KB

      MD5

      35d718538c3e1346cb4fcf54aaa0f141

      SHA1

      234c0aa0465c27c190a83936e8e3aa3c4b991224

      SHA256

      97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

      SHA512

      4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1YG58bV6.exe

      Filesize

      194KB

      MD5

      35d718538c3e1346cb4fcf54aaa0f141

      SHA1

      234c0aa0465c27c190a83936e8e3aa3c4b991224

      SHA256

      97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

      SHA512

      4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2uU6050.exe

      Filesize

      432KB

      MD5

      4cebbfa84ddc34fa1c231c04fe2fdf27

      SHA1

      985659dc4f2adf11123d075c94145f442565da51

      SHA256

      df444c2087c0e3ce9c8ab639da32021dc18555cde059968b08fe941ead756d26

      SHA512

      dcf3537741054e2d3024b8435026314dc869983f80410fcdec32216c7e7f81a2a6818283b3c96f0a6d4cc49f6211b3facf7dd3bcc486eda174f7e6650864fe11

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2uU6050.exe

      Filesize

      432KB

      MD5

      4cebbfa84ddc34fa1c231c04fe2fdf27

      SHA1

      985659dc4f2adf11123d075c94145f442565da51

      SHA256

      df444c2087c0e3ce9c8ab639da32021dc18555cde059968b08fe941ead756d26

      SHA512

      dcf3537741054e2d3024b8435026314dc869983f80410fcdec32216c7e7f81a2a6818283b3c96f0a6d4cc49f6211b3facf7dd3bcc486eda174f7e6650864fe11

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2uU6050.exe

      Filesize

      432KB

      MD5

      4cebbfa84ddc34fa1c231c04fe2fdf27

      SHA1

      985659dc4f2adf11123d075c94145f442565da51

      SHA256

      df444c2087c0e3ce9c8ab639da32021dc18555cde059968b08fe941ead756d26

      SHA512

      dcf3537741054e2d3024b8435026314dc869983f80410fcdec32216c7e7f81a2a6818283b3c96f0a6d4cc49f6211b3facf7dd3bcc486eda174f7e6650864fe11

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2uU6050.exe

      Filesize

      432KB

      MD5

      4cebbfa84ddc34fa1c231c04fe2fdf27

      SHA1

      985659dc4f2adf11123d075c94145f442565da51

      SHA256

      df444c2087c0e3ce9c8ab639da32021dc18555cde059968b08fe941ead756d26

      SHA512

      dcf3537741054e2d3024b8435026314dc869983f80410fcdec32216c7e7f81a2a6818283b3c96f0a6d4cc49f6211b3facf7dd3bcc486eda174f7e6650864fe11

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2uU6050.exe

      Filesize

      432KB

      MD5

      4cebbfa84ddc34fa1c231c04fe2fdf27

      SHA1

      985659dc4f2adf11123d075c94145f442565da51

      SHA256

      df444c2087c0e3ce9c8ab639da32021dc18555cde059968b08fe941ead756d26

      SHA512

      dcf3537741054e2d3024b8435026314dc869983f80410fcdec32216c7e7f81a2a6818283b3c96f0a6d4cc49f6211b3facf7dd3bcc486eda174f7e6650864fe11

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2uU6050.exe

      Filesize

      432KB

      MD5

      4cebbfa84ddc34fa1c231c04fe2fdf27

      SHA1

      985659dc4f2adf11123d075c94145f442565da51

      SHA256

      df444c2087c0e3ce9c8ab639da32021dc18555cde059968b08fe941ead756d26

      SHA512

      dcf3537741054e2d3024b8435026314dc869983f80410fcdec32216c7e7f81a2a6818283b3c96f0a6d4cc49f6211b3facf7dd3bcc486eda174f7e6650864fe11

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2uU6050.exe

      Filesize

      432KB

      MD5

      4cebbfa84ddc34fa1c231c04fe2fdf27

      SHA1

      985659dc4f2adf11123d075c94145f442565da51

      SHA256

      df444c2087c0e3ce9c8ab639da32021dc18555cde059968b08fe941ead756d26

      SHA512

      dcf3537741054e2d3024b8435026314dc869983f80410fcdec32216c7e7f81a2a6818283b3c96f0a6d4cc49f6211b3facf7dd3bcc486eda174f7e6650864fe11

    • memory/2448-79-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2448-92-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2448-97-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2448-93-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2448-90-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2448-88-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2448-87-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/2448-86-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2448-85-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2448-84-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2448-83-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2448-81-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2948-49-0x0000000000BE0000-0x0000000000BF6000-memory.dmp

      Filesize

      88KB

    • memory/2948-67-0x0000000000BE0000-0x0000000000BF6000-memory.dmp

      Filesize

      88KB

    • memory/2948-53-0x0000000000BE0000-0x0000000000BF6000-memory.dmp

      Filesize

      88KB

    • memory/2948-69-0x0000000000BE0000-0x0000000000BF6000-memory.dmp

      Filesize

      88KB

    • memory/2948-51-0x0000000000BE0000-0x0000000000BF6000-memory.dmp

      Filesize

      88KB

    • memory/2948-65-0x0000000000BE0000-0x0000000000BF6000-memory.dmp

      Filesize

      88KB

    • memory/2948-63-0x0000000000BE0000-0x0000000000BF6000-memory.dmp

      Filesize

      88KB

    • memory/2948-59-0x0000000000BE0000-0x0000000000BF6000-memory.dmp

      Filesize

      88KB

    • memory/2948-61-0x0000000000BE0000-0x0000000000BF6000-memory.dmp

      Filesize

      88KB

    • memory/2948-45-0x0000000000BE0000-0x0000000000BF6000-memory.dmp

      Filesize

      88KB

    • memory/2948-47-0x0000000000BE0000-0x0000000000BF6000-memory.dmp

      Filesize

      88KB

    • memory/2948-55-0x0000000000BE0000-0x0000000000BF6000-memory.dmp

      Filesize

      88KB

    • memory/2948-43-0x0000000000BE0000-0x0000000000BF6000-memory.dmp

      Filesize

      88KB

    • memory/2948-42-0x0000000000BE0000-0x0000000000BF6000-memory.dmp

      Filesize

      88KB

    • memory/2948-41-0x0000000000BE0000-0x0000000000BFC000-memory.dmp

      Filesize

      112KB

    • memory/2948-57-0x0000000000BE0000-0x0000000000BF6000-memory.dmp

      Filesize

      88KB

    • memory/2948-40-0x0000000000B90000-0x0000000000BAE000-memory.dmp

      Filesize

      120KB