Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 21:49
Static task
static1
Behavioral task
behavioral1
Sample
82999d5425898b535b14abcd994a7c2f_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
82999d5425898b535b14abcd994a7c2f_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
82999d5425898b535b14abcd994a7c2f_JC.exe
-
Size
568KB
-
MD5
82999d5425898b535b14abcd994a7c2f
-
SHA1
5dba78327d04cd171e0102818f6b958a60dfedec
-
SHA256
e2e6fe31615846eccf919b4a3666325eadd09068f36329066d0a1ed5e0d40d16
-
SHA512
6bf80079da68281decb536cca64aad5cb6ceefa39f7d230e50879546824db7b0e6d2ee16b83b37b4a8781fb0c45b4fc213f20c7d63831ceb360d46e0633841f1
-
SSDEEP
12288:Hw61ovtukaBc7SdtH4mOnt2yRDVOZmdbsi+L8K08YtrE:Hw61/BntZQ1Rksbsi2/VY6
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe sIRC4.exe" 82999d5425898b535b14abcd994a7c2f_JC.exe -
Drops file in System32 directory 17 IoCs
description ioc Process File created C:\Windows\SysWOW64\xdccPrograms\Uninstall.exe 82999d5425898b535b14abcd994a7c2f_JC.exe File created C:\Windows\SysWOW64\xdccPrograms\appvcleaner.exe 82999d5425898b535b14abcd994a7c2f_JC.exe File created C:\Windows\SysWOW64\xdccPrograms\office2016setup.exe 82999d5425898b535b14abcd994a7c2f_JC.exe File created C:\Windows\SysWOW64\xdccPrograms\AppVShNotify.exe 82999d5425898b535b14abcd994a7c2f_JC.exe File created C:\Windows\SysWOW64\xdccPrograms\7z.exe 82999d5425898b535b14abcd994a7c2f_JC.exe File created C:\Windows\SysWOW64\xdccPrograms\7zFM.exe 82999d5425898b535b14abcd994a7c2f_JC.exe File created C:\Windows\SysWOW64\xdccPrograms\7zG.exe 82999d5425898b535b14abcd994a7c2f_JC.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\7zG.exe 82999d5425898b535b14abcd994a7c2f_JC.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\appvcleaner.exe 82999d5425898b535b14abcd994a7c2f_JC.exe File created C:\Windows\SysWOW64\DC++ Share\MavInject32.exe 82999d5425898b535b14abcd994a7c2f_JC.exe File created C:\Windows\SysWOW64\sIRC4.exe 82999d5425898b535b14abcd994a7c2f_JC.exe File opened for modification C:\Windows\SysWOW64\sIRC4.exe 82999d5425898b535b14abcd994a7c2f_JC.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\7z.exe 82999d5425898b535b14abcd994a7c2f_JC.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\7zFM.exe 82999d5425898b535b14abcd994a7c2f_JC.exe File created C:\Windows\SysWOW64\xdccPrograms\InspectorOfficeGadget.exe 82999d5425898b535b14abcd994a7c2f_JC.exe File created C:\Windows\SysWOW64\xdccPrograms\IntegratedOffice.exe 82999d5425898b535b14abcd994a7c2f_JC.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\IntegratedOffice.exe 82999d5425898b535b14abcd994a7c2f_JC.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
847KB
MD561c2c9a48fef254f5b2ac47b8ef8c2d3
SHA182dc924c9eac98ebd655b7745bc0c90c3e9306e0
SHA2569bc670b11f0a295062f52ae74ce1645a9b8ad21db557e88c659e9277eaa4ad86
SHA5126d27fdc75eeccc4c90ea48090169b66c89b27b17308a6d17cc754ccb4dd1095e57997a789c428ca5115840effe6f75b58e194d3459d6a2cf392e0b5106abff7c