Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 14:09
Static task
static1
Behavioral task
behavioral1
Sample
03058c71b2999ec29258b84501c280af_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
03058c71b2999ec29258b84501c280af_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
03058c71b2999ec29258b84501c280af_JC.exe
-
Size
325KB
-
MD5
03058c71b2999ec29258b84501c280af
-
SHA1
587e17acc5a863bae2591b4b998d17b5c9c00e83
-
SHA256
ad6e4a633306c69735d6080901c3a1f85beefe9f124ce48d07e8505b7ba11ba7
-
SHA512
994bb1a7d806683ec8bf49f4b9ae2cd0d6687060d56b632235668cb4444de7a7589f8b1cfaa45f2fe23390ed17e8e1500863d39b8eb4d523a91802254a870088
-
SSDEEP
6144:MFlKgzelZNQSBQGH/CSpWqT6oAXjiU4bz:LfBQGH6Sf+oAX+U4
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 10 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: 03058c71b2999ec29258b84501c280af_JC.exe File opened (read-only) \??\J: 03058c71b2999ec29258b84501c280af_JC.exe File opened (read-only) \??\L: 03058c71b2999ec29258b84501c280af_JC.exe File opened (read-only) \??\M: 03058c71b2999ec29258b84501c280af_JC.exe File opened (read-only) \??\N: 03058c71b2999ec29258b84501c280af_JC.exe File opened (read-only) \??\O: 03058c71b2999ec29258b84501c280af_JC.exe File opened (read-only) \??\G: 03058c71b2999ec29258b84501c280af_JC.exe File opened (read-only) \??\I: 03058c71b2999ec29258b84501c280af_JC.exe File opened (read-only) \??\K: 03058c71b2999ec29258b84501c280af_JC.exe File opened (read-only) \??\E: 03058c71b2999ec29258b84501c280af_JC.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Themes\\TranscodedWallpaper.jpg" 03058c71b2999ec29258b84501c280af_JC.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\RCXCE13.tmp 03058c71b2999ec29258b84501c280af_JC.exe File opened for modification C:\Program Files\Windows Journal\Journal.cab 03058c71b2999ec29258b84501c280af_JC.exe File opened for modification C:\Program Files\Windows Media Player\wmpnscfg.cab 03058c71b2999ec29258b84501c280af_JC.exe File created C:\Program Files\Windows Media Player\wmpshare.exe 03058c71b2999ec29258b84501c280af_JC.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.cab 03058c71b2999ec29258b84501c280af_JC.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe 03058c71b2999ec29258b84501c280af_JC.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.cab 03058c71b2999ec29258b84501c280af_JC.exe File created C:\Program Files\Internet Explorer\ieinstal.exe 03058c71b2999ec29258b84501c280af_JC.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.cab 03058c71b2999ec29258b84501c280af_JC.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.cab 03058c71b2999ec29258b84501c280af_JC.exe File opened for modification C:\Program Files\Java\jre7\bin\RCXCFC5.tmp 03058c71b2999ec29258b84501c280af_JC.exe File created C:\Program Files\Windows Media Player\WMPDMC.cab 03058c71b2999ec29258b84501c280af_JC.exe File created C:\Program Files\Windows Media Player\wmprph.cab 03058c71b2999ec29258b84501c280af_JC.exe File created C:\Program Files\Windows Mail\wabmig.exe 03058c71b2999ec29258b84501c280af_JC.exe File created C:\Program Files\Windows Media Player\wmpnetwk.cab 03058c71b2999ec29258b84501c280af_JC.exe File opened for modification C:\Program Files\Windows NT\Accessories\wordpad.cab 03058c71b2999ec29258b84501c280af_JC.exe File created C:\Program Files\7-Zip\7z.cab 03058c71b2999ec29258b84501c280af_JC.exe File created C:\Program Files\7-Zip\7zFM.cab 03058c71b2999ec29258b84501c280af_JC.exe File created C:\Program Files\Mozilla Firefox\uninstall\helper.cab 03058c71b2999ec29258b84501c280af_JC.exe File opened for modification C:\Program Files\VideoLAN\VLC\RCXD296.tmp 03058c71b2999ec29258b84501c280af_JC.exe File opened for modification C:\Program Files\7-Zip\RCXCB0F.tmp 03058c71b2999ec29258b84501c280af_JC.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\InputPersonalization.cab 03058c71b2999ec29258b84501c280af_JC.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\RCXCF84.tmp 03058c71b2999ec29258b84501c280af_JC.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\RCXD177.tmp 03058c71b2999ec29258b84501c280af_JC.exe File created C:\Program Files\Windows Media Player\wmpnscfg.cab 03058c71b2999ec29258b84501c280af_JC.exe File opened for modification C:\Program Files\Windows Photo Viewer\ImagingDevices.cab 03058c71b2999ec29258b84501c280af_JC.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCXCD5B.tmp 03058c71b2999ec29258b84501c280af_JC.exe File opened for modification C:\Program Files\Microsoft Games\Chess\RCXD066.tmp 03058c71b2999ec29258b84501c280af_JC.exe File opened for modification C:\Program Files\Microsoft Games\Chess\Chess.exe 03058c71b2999ec29258b84501c280af_JC.exe File opened for modification C:\Program Files\Windows Mail\wabmig.cab 03058c71b2999ec29258b84501c280af_JC.exe File opened for modification C:\Program Files\Windows Journal\PDIALOG.cab 03058c71b2999ec29258b84501c280af_JC.exe File opened for modification C:\Program Files\Windows Media Player\WMPDMC.cab 03058c71b2999ec29258b84501c280af_JC.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCXCD59.tmp 03058c71b2999ec29258b84501c280af_JC.exe File opened for modification C:\Program Files\Microsoft Games\Chess\Chess.cab 03058c71b2999ec29258b84501c280af_JC.exe File opened for modification C:\Program Files\Mozilla Firefox\RCXD0E6.tmp 03058c71b2999ec29258b84501c280af_JC.exe File opened for modification C:\Program Files\Mozilla Firefox\RCXD0E7.tmp 03058c71b2999ec29258b84501c280af_JC.exe File created C:\Program Files\Common Files\Microsoft Shared\MSInfo\msinfo32.cab 03058c71b2999ec29258b84501c280af_JC.exe File opened for modification C:\Program Files\Java\jre7\bin\java-rmi.exe 03058c71b2999ec29258b84501c280af_JC.exe File created C:\Program Files\Windows Mail\wab.cab 03058c71b2999ec29258b84501c280af_JC.exe File opened for modification C:\Program Files\Windows Media Player\wmpenc.cab 03058c71b2999ec29258b84501c280af_JC.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\TabTip.cab 03058c71b2999ec29258b84501c280af_JC.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\msinfo32.cab 03058c71b2999ec29258b84501c280af_JC.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\RCXCE84.tmp 03058c71b2999ec29258b84501c280af_JC.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.cab 03058c71b2999ec29258b84501c280af_JC.exe File opened for modification C:\Program Files\7-Zip\7zFM.cab 03058c71b2999ec29258b84501c280af_JC.exe File created C:\Program Files\Google\Chrome\Application\chrome_proxy.cab 03058c71b2999ec29258b84501c280af_JC.exe File created C:\Program Files\Windows Media Player\wmpenc.exe 03058c71b2999ec29258b84501c280af_JC.exe File created C:\Program Files\Windows Media Player\wmprph.exe 03058c71b2999ec29258b84501c280af_JC.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCXCD5A.tmp 03058c71b2999ec29258b84501c280af_JC.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.cab 03058c71b2999ec29258b84501c280af_JC.exe File created C:\Program Files\Internet Explorer\iexplore.cab 03058c71b2999ec29258b84501c280af_JC.exe File created C:\Program Files\Internet Explorer\iexplore.exe 03058c71b2999ec29258b84501c280af_JC.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe 03058c71b2999ec29258b84501c280af_JC.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\apt.cab 03058c71b2999ec29258b84501c280af_JC.exe File created C:\Program Files\Windows Photo Viewer\ImagingDevices.cab 03058c71b2999ec29258b84501c280af_JC.exe File opened for modification C:\Program Files\VideoLAN\VLC\RCXD274.tmp 03058c71b2999ec29258b84501c280af_JC.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 03058c71b2999ec29258b84501c280af_JC.exe File created C:\Program Files\Google\Chrome\Application\chrome.cab 03058c71b2999ec29258b84501c280af_JC.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\RCXCF64.tmp 03058c71b2999ec29258b84501c280af_JC.exe File created C:\Program Files\Windows Mail\WinMail.cab 03058c71b2999ec29258b84501c280af_JC.exe File opened for modification C:\Program Files\Microsoft Games\Chess\RCXD056.tmp 03058c71b2999ec29258b84501c280af_JC.exe File opened for modification C:\Program Files\VideoLAN\VLC\RCXD2A7.tmp 03058c71b2999ec29258b84501c280af_JC.exe File created C:\Program Files\Windows Media Player\wmpconfig.cab 03058c71b2999ec29258b84501c280af_JC.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\RCXCE64.tmp 03058c71b2999ec29258b84501c280af_JC.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\windows\WallPapers.jpg 03058c71b2999ec29258b84501c280af_JC.exe File created C:\windows\readme.1xt 03058c71b2999ec29258b84501c280af_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Desktop\General 03058c71b2999ec29258b84501c280af_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Desktop\General\WallpaperSource = "C:\\windows\\WallPapers.jpg" 03058c71b2999ec29258b84501c280af_JC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\03058c71b2999ec29258b84501c280af_JC.exe"C:\Users\Admin\AppData\Local\Temp\03058c71b2999ec29258b84501c280af_JC.exe"1⤵
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
PID:1180
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
370KB
MD5a780856656d37066bdb86db3a7e344b5
SHA1342574539a9da336c444648c443953467a2ac01c
SHA256954890571db101392ae1c2f9598b35ba0c19b823b65a1c97747215568e180e4e
SHA512c03178afbc13895853b476ad71a81d24e464087baaeceed5ba4b838d1f565d243a3a0cad0c9b96ae1625607de3a29a0636ef775d99185220bc3cf8c4b3821fa9
-
Filesize
847KB
MD5c8f40f25f783a52262bdaedeb5555427
SHA1e45e198607c8d7398745baa71780e3e7a2f6deca
SHA256e81b44ee7381ae3b630488b6fb7e3d9ffbdd9ac3032181d4ccaaff3409b57316
SHA512f5944743f54028eb1dd0f2d68468726b177d33185324da0da96cdd20768bab4ca2e507ae9157b2733fd6240c920b7e15a5f5b9f284ee09d0fd385fc895b97191
-
Filesize
118KB
MD5f45a7db6aec433fd579774dfdb3eaa89
SHA12f8773cc2b720143776a0909d19b98c4954b39cc
SHA2562bc2372cfabd26933bc4012046e66a5d2efc9554c0835d1a0aa012d3bd1a6f9a
SHA51203a4b7c53373ff6308a0292bb84981dc1566923e93669bbb11cb03d9f58a8d477a1a2399aac5059f477bbf1cf14b17817d208bc7c496b8675ece83cdabec5662
-
Filesize
284KB
MD5f47e39d85d07a4eeccc41cebc1036a00
SHA11a40678b2b3c912e0ef1a784eb5dcee3669388f2
SHA256e10d23e6611556ace977c07463bacb2e4fef15bc7b46fea61f31288ad3c972b0
SHA512fec91328a32c530d0fcf3b3900ac980da95484c7d0ddbb38a3fbeb66bd41ba4adfbf608dc1b719c112b9a60fc207dc53ecfdd1b1750778f3bd90b5a43e6899ad
-
Filesize
4.3MB
MD52161730a7ae00a1fb8c5020a43be949f
SHA18db6b820472cdfa266c874e0d3a9395412995aa1
SHA25607e7896b2304e3b9966294a02d2ed32f41994ee7bd0a284e4160743edaeb9e15
SHA512aa3659b6184f4273b7fcf1f7d2cd0a5a9129b8856d15e4ca8904b709e85cd432538ce0510ca9777760a1a9d5391671232a79908860e7d665260a54910f6fea5a
-
Filesize
1.6MB
MD5527e039ba9add8a7fac3a6bc30a6d476
SHA1729a329265eda72cada039c1941e7c672addfc19
SHA2564b8a72fc81b733ed2e6e70d4c5401f954002783dbf14927849ad579860780b94
SHA5129e73e14e33a5f07a87e9c1fecfdaee09d1408471052aacfde3d1e877dad4d253b525ebefca6bddabc23cf81d8dcce0785aedcc2f135d171ecbb1feaeb922c449
-
Filesize
1.6MB
MD5ec6386b63c3a5ffe0577905e94262c3a
SHA18f8c428d0e7f32c9d733ca28384ded413a060588
SHA256302c968ab3e1227d54df4e72f39088d7483d25eeb3037f0b16bc39cef2728fa4
SHA512ddbefb759858493de1f9d7addc6ff4488c8be3164374e0a88c3cbe97751510005dfe6d91c5499fcbdc35aa33a8eda2d45591a66e54ab9462277dc833faef77c3
-
Filesize
284KB
MD55464f8c6f6e70cf7f07fb725e73cf004
SHA1eb24a63c5a41ba25f40ae12bf525c51426e2bf79
SHA256a22f55297dc81e9774e75c81b16bf471f0feab7f12f83066231d913232f41a48
SHA512631dc60ecc2a273d907bed09f0112e30a84750c05a3f501b203b65a1f1c76fc744de6df8fbaf170d5e14bc44381d86dabdb5dcda3dd128da1173333971d8c74d
-
Filesize
2.8MB
MD5095092f4e746810c5829038d48afd55a
SHA1246eb3d41194dddc826049bbafeb6fc522ec044a
SHA2562f606012843d144610dc7be55d1716d5d106cbc6acbce57561dc0e62c38b8588
SHA5127f36fc03bfed0f3cf6ac3406c819993bf995e4f8c26a7589e9032c14b5a9c7048f5567f77b3b15f946c5282fc0be6308a92eab7879332d74c400d0c139ce8400
-
Filesize
1020KB
MD5b65d7344b0a7faa207d2e1a7adaafb60
SHA1755ad15b1745b0e730d658d4a92e2b754425b7db
SHA256f4b91fbbcba8a46eefe4965e4a24c6ede3decbd1fec96e141a1953173efd1c92
SHA512f17ac73c2df7c73a31b11ce0f533d6db91bdb0cdeea653dcd52ac72c3cf28da0c236b79586ddc7a6c825fdd171290722f888465e776f12ac2cae75be82726b22
-
Filesize
15KB
MD5c9aaf1247944e0928d6a7eae35e8cdc4
SHA1af91d57336d495bb220d8f72dcf59f34f5998fd3
SHA25605b153ba07dc1a262fb1013d42bfc24d9000ce607f07d227593c975cdf0bb25b
SHA512bf3bc64135810948626105a8f76dc4439e68ee531f20d901c3082ae2155f2ea35f34d408de44b46ede61ded832fcc61ac1cb9719e432f0f07b49479c95847e51
-
Filesize
15KB
MD5407d2d7dab36cdea871d4c6b9c62b258
SHA186cd158ad810c6772c22a5799c7acf4b9d7c9f57
SHA2563c040679ea4be0cc5ca20c9f24caf6c13d3002560347e7446dc963b611523bd9
SHA512dcdb53a3ca2a3637216a9d8133d1dbda336a6d3a98c6b956af42f94adbc136dc5a0245e87512d0314f23dbf3cab4900bc40ac13c79ee93a677d93a89e0cd9e17
-
Filesize
54KB
MD5e795eb03297dd66d2efac2c33920a69f
SHA1bf41799164d6ab2690c39afa458122ed82f2d0a8
SHA256133afb441f29c697a5232752483ef2eecc297446f6db941bd68af7ed056cecf1
SHA5126a334a07afadcd5c29c30add22142392bdc70d8ae0f36140f2ba7c9b4e70a9efd87b7fbd8b3ef862cea7aebdddfd18bb0521308d9a69070ae4a84432f522c4ef
-
Filesize
15KB
MD5d3827115574d8b0ecbaeb03528c6d1a4
SHA12733607537ffc00e038039af7eba24601db6fbeb
SHA2566ad5b065b3f612d89127b89033aaaff995942187f917144dbe28e656c3ba348f
SHA5122a1f131960f452d1012a43597f2ac9df0edc22b6aa68fd52eabf4a4249d86c7776d625e00e7c5dbd4f35add9e31cbc02674be40714f9aa5f3a2f458419303c18
-
Filesize
3.0MB
MD507dd9dcd1cc2840751a1f8772f3c0195
SHA1c6203a3990cfbf396ae87110e341f773cd6be4c1
SHA2569b39147e1ba781ea8e463c22700f6ce354ac5e775e36657fd87bf41074835602
SHA5125e547dc18a2b44a6dd67f6b43ee5b5b1bbd4ec1e8b5507b0d990837a7adb72b66808e7487f97062d54e4d3c2c7b791e3b580c9ed316e9d003849f7a6f6a3d56b
-
Filesize
85KB
MD578e89dc545e6374c4e6c09c1d3ce0466
SHA1bcbfe02e7fed041894db6404e60690d02301b763
SHA256fabc7c12fd6523338f8adb3fefcaed7f213afe95e784ef36ecdf42da67421ab1
SHA5126f4dbd49e79c5e540ea9b35e4acbcaf7c294781691ee4681580048aa75671d9d3f48c4d474ec834d9c193d2c597302554a6ce6c10651a4cc9d11db284b0884f8
-
Filesize
262KB
MD573603c36b4d1522c3402d67ecf657312
SHA16a964ae5d681455c320ea0f8611b79a99a35b283
SHA2567fb934da4bebc1cb81c3e9f5be4dbb3e43aa8098b6e63f5e0b97b3cc105830b4
SHA5125fdc5f8ab72bd05ebea6068c896a7805211a9bdccf0167f48ac456a1e4283b59001e588d7349e34f8511fa297f98af8d5140c883e6d4a192af8d350a433c0238
-
Filesize
697KB
MD53fa2910cbd44b17be47ff26ef27c5157
SHA1d8a2bbcd3c88671b48478db293c61268fc24accf
SHA256d448206c75c51f8a44a1c7fd5dabb8b0505f670ecb2e5d2adf55791b9cef1b0c
SHA51216b70c679db2ba74a98f99956984fa044e96c821ccd5521b4882134c705b823674891d0521dc49c2391d5c184bbbd0c6d68890df65aad1972113aeda4f3b944a
-
Filesize
1.2MB
MD5d358e785b13cdb7846b3ec8b74c3ce43
SHA18581ec4bcd412733f64ed547b7b63bfec0caab7d
SHA2563cdb1c6e5f4a607bc310b745d551b59eca0aac02cb83da146bedc52aa05a6beb
SHA512451a4a6003d1ca1de98ea291537ca793621e4e23a75fa39e05320737bcd6bb4242d4fefa4c7458399fb54a5414635c3f67c8972377183b289fbb05aa13c91629
-
Filesize
228KB
MD55ba8b6e3a9d08a4fd4f71eed8cc56275
SHA15bfd77c8ddbca1dd2d4e6a9e08a0d89b50a654d0
SHA256e202657abb97ac953185c97f0d4e3d3133fe760d8b8c4e97a2c53d94bb8d58e2
SHA512e8242d974ff4c103cc1af4d44e55070abca619dfbae0fe450fb2dbe165a0af629c5e010bc0cbc5d7a8d40a2c420aacb3857f4d410f65235da8099379458fe419
-
Filesize
137KB
MD5b2bf2621b184914d48bb147d38f64392
SHA1b733404cf4231a069d47ca68b88118ddf05b18e0
SHA256276c5e546732a7b5585670943c84fe4ea782a601ad54ad4248605ad4ee916210
SHA5122966c8222af45c16c38a8341036ee58f65463d9874cc871639760b395cd8a3252e962b347e4b27c3aaf5735caeb5fc3154a29092d686642b66b49682662a168a
-
Filesize
135KB
MD50d472c9720e55e9c249207de6c69722c
SHA17244426a440a268cb37b49005812b8f20f052776
SHA256bc1d3cfb69f97bc930af3af7be8601e60eb1cc78516aa844e41c65e51c316de3
SHA512f77bf33604691e0f21f1f3548187153495aad5cd5beb80b409ff50c71502e5303ddb7d64b652edc5b4177bf88e8cee0df914f91b9532b9b1116af32050291cca