Analysis
-
max time kernel
143s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 13:56
Static task
static1
Behavioral task
behavioral1
Sample
ad48d7398c3d4589f7cdfeeab01fd906_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ad48d7398c3d4589f7cdfeeab01fd906_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
ad48d7398c3d4589f7cdfeeab01fd906_JC.exe
-
Size
66KB
-
MD5
ad48d7398c3d4589f7cdfeeab01fd906
-
SHA1
61a7553e6a541d1059b2fca1f3e9f16dfd4e2c25
-
SHA256
847f33f20a3e8fcab52f800e07f8cc9c615e1a244339d9a32f01cd27310c8a96
-
SHA512
12db4d780061ba1b90a5a21af7772981a8140c943ae9e66aee1c0d71bf915eefa1dd767cd72101de1433e75ba12dea75801f455ce7b6ba4064f358ac6fa1c6af
-
SSDEEP
768:TrItKyw5WHXfQmjIiIk9ecAa0Mb96SyX1DLdRXXXx:Tr3Z5IfQmv81ar1yXtZf
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2632 attrib.exe -
Deletes itself 1 IoCs
pid Process 2652 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2064 rwmhost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Debug\rwmhost.exe ad48d7398c3d4589f7cdfeeab01fd906_JC.exe File opened for modification C:\Windows\Debug\rwmhost.exe ad48d7398c3d4589f7cdfeeab01fd906_JC.exe File opened for modification C:\Windows\Debug\rwmhost.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2944 ad48d7398c3d4589f7cdfeeab01fd906_JC.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2944 wrote to memory of 2632 2944 ad48d7398c3d4589f7cdfeeab01fd906_JC.exe 24 PID 2944 wrote to memory of 2632 2944 ad48d7398c3d4589f7cdfeeab01fd906_JC.exe 24 PID 2944 wrote to memory of 2632 2944 ad48d7398c3d4589f7cdfeeab01fd906_JC.exe 24 PID 2944 wrote to memory of 2632 2944 ad48d7398c3d4589f7cdfeeab01fd906_JC.exe 24 PID 2944 wrote to memory of 2652 2944 ad48d7398c3d4589f7cdfeeab01fd906_JC.exe 31 PID 2944 wrote to memory of 2652 2944 ad48d7398c3d4589f7cdfeeab01fd906_JC.exe 31 PID 2944 wrote to memory of 2652 2944 ad48d7398c3d4589f7cdfeeab01fd906_JC.exe 31 PID 2944 wrote to memory of 2652 2944 ad48d7398c3d4589f7cdfeeab01fd906_JC.exe 31 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2632 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad48d7398c3d4589f7cdfeeab01fd906_JC.exe"C:\Users\Admin\AppData\Local\Temp\ad48d7398c3d4589f7cdfeeab01fd906_JC.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\rwmhost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:2632
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\AD48D7~1.EXE > nul2⤵
- Deletes itself
PID:2652
-
-
C:\Windows\Debug\rwmhost.exeC:\Windows\Debug\rwmhost.exe1⤵
- Executes dropped EXE
PID:2064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5bb8ed2ad53ec014c2784f83ee2e4410e
SHA1f0c4487858bc7b0ab0508abc38065efcca817477
SHA2562033d0f30c0ad25dc1b81bb9fce7b1300b3a97b9e3aa36cf3279a9c3ade1246e
SHA51295884fce154fe9280388b176ec07bae2844b6dec737daaf49423d406189bda53d00ed63b3aef7efcbcdcf8fe3754621cf0d1d5f3fd95f9eb7cbf98b24a48319c
-
Filesize
66KB
MD5bb8ed2ad53ec014c2784f83ee2e4410e
SHA1f0c4487858bc7b0ab0508abc38065efcca817477
SHA2562033d0f30c0ad25dc1b81bb9fce7b1300b3a97b9e3aa36cf3279a9c3ade1246e
SHA51295884fce154fe9280388b176ec07bae2844b6dec737daaf49423d406189bda53d00ed63b3aef7efcbcdcf8fe3754621cf0d1d5f3fd95f9eb7cbf98b24a48319c