Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 19:06
Static task
static1
Behavioral task
behavioral1
Sample
d98f926f3a2ea1308e2d80705591f91b_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d98f926f3a2ea1308e2d80705591f91b_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
d98f926f3a2ea1308e2d80705591f91b_JC.exe
-
Size
472KB
-
MD5
d98f926f3a2ea1308e2d80705591f91b
-
SHA1
badd7d2f741c15d58139a1ebc3ac0f5152f195b1
-
SHA256
17e75f28d1566e91fc1e91a7782da24b1cf215fb7d5c2dfd746d7d4808049318
-
SHA512
eac1f64906642702597a2952ab5817ff632d8aa1ebfb7a0dd759e6cff4309764621fd41abb03f703fe28bf564266c5e7d426df053fc8c4a75fc1ee9961a88338
-
SSDEEP
6144:Wf+Jjjou35J6i5plrzuo6/LkeYvjoIHnv0RX/VwFdLD/7MsrYMC+9GXL9M8sG3dR:hj8u3ui5pl+uBvc/V0FdYxJdRqMt
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation LSASS.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation d98f926f3a2ea1308e2d80705591f91b_JC.exe -
Executes dropped EXE 2 IoCs
pid Process 4500 LSASS.exe 3264 LSASS.exe -
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysUtils = "C:\\Windows\\LSASS.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysUtils = "C:\\Windows\\LSASS.exe" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SysUtils = "C:\\Windows\\LSASS.exe" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SysUtils = "C:\\Windows\\LSASS.exe" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SysUtils = "C:\\Users\\Admin\\AppData\\Local\\Temp\\d98f926f3a2ea1308e2d80705591f91b_JC.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysUtils = "C:\\Windows\\LSASS.exe" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SysUtils = "C:\\Windows\\LSASS.exe" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SysUtils = "C:\\Windows\\LSASS.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysUtils = "C:\\Windows\\LSASS.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysUtils = "C:\\Users\\Admin\\AppData\\Local\\Temp\\d98f926f3a2ea1308e2d80705591f91b_JC.exe" REG.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: LSASS.exe File opened (read-only) \??\O: LSASS.exe File opened (read-only) \??\V: LSASS.exe File opened (read-only) \??\Y: LSASS.exe File opened (read-only) \??\E: LSASS.exe File opened (read-only) \??\G: LSASS.exe File opened (read-only) \??\K: LSASS.exe File opened (read-only) \??\N: LSASS.exe File opened (read-only) \??\W: LSASS.exe File opened (read-only) \??\L: LSASS.exe File opened (read-only) \??\P: LSASS.exe File opened (read-only) \??\S: LSASS.exe File opened (read-only) \??\T: LSASS.exe File opened (read-only) \??\Z: LSASS.exe File opened (read-only) \??\U: LSASS.exe File opened (read-only) \??\X: LSASS.exe File opened (read-only) \??\I: LSASS.exe File opened (read-only) \??\J: LSASS.exe File opened (read-only) \??\M: LSASS.exe File opened (read-only) \??\Q: LSASS.exe File opened (read-only) \??\R: LSASS.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\autorun.inf LSASS.exe File opened for modification C:\autorun.inf LSASS.exe File created F:\autorun.inf LSASS.exe File opened for modification F:\autorun.inf LSASS.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\LSASS.exe d98f926f3a2ea1308e2d80705591f91b_JC.exe File opened for modification C:\Windows\LSASS.exe d98f926f3a2ea1308e2d80705591f91b_JC.exe File opened for modification C:\Windows\LSASS.exe LSASS.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ d98f926f3a2ea1308e2d80705591f91b_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ LSASS.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4128 d98f926f3a2ea1308e2d80705591f91b_JC.exe 4128 d98f926f3a2ea1308e2d80705591f91b_JC.exe 4128 d98f926f3a2ea1308e2d80705591f91b_JC.exe 4128 d98f926f3a2ea1308e2d80705591f91b_JC.exe 4128 d98f926f3a2ea1308e2d80705591f91b_JC.exe 4128 d98f926f3a2ea1308e2d80705591f91b_JC.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 3264 LSASS.exe 3264 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe 4500 LSASS.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4128 wrote to memory of 4500 4128 d98f926f3a2ea1308e2d80705591f91b_JC.exe 85 PID 4128 wrote to memory of 4500 4128 d98f926f3a2ea1308e2d80705591f91b_JC.exe 85 PID 4128 wrote to memory of 4500 4128 d98f926f3a2ea1308e2d80705591f91b_JC.exe 85 PID 4128 wrote to memory of 4676 4128 d98f926f3a2ea1308e2d80705591f91b_JC.exe 88 PID 4128 wrote to memory of 4676 4128 d98f926f3a2ea1308e2d80705591f91b_JC.exe 88 PID 4128 wrote to memory of 4676 4128 d98f926f3a2ea1308e2d80705591f91b_JC.exe 88 PID 4128 wrote to memory of 2588 4128 d98f926f3a2ea1308e2d80705591f91b_JC.exe 89 PID 4128 wrote to memory of 2588 4128 d98f926f3a2ea1308e2d80705591f91b_JC.exe 89 PID 4128 wrote to memory of 2588 4128 d98f926f3a2ea1308e2d80705591f91b_JC.exe 89 PID 4500 wrote to memory of 508 4500 LSASS.exe 95 PID 4500 wrote to memory of 508 4500 LSASS.exe 95 PID 4500 wrote to memory of 508 4500 LSASS.exe 95 PID 4500 wrote to memory of 5076 4500 LSASS.exe 96 PID 4500 wrote to memory of 5076 4500 LSASS.exe 96 PID 4500 wrote to memory of 5076 4500 LSASS.exe 96 PID 4500 wrote to memory of 3264 4500 LSASS.exe 100 PID 4500 wrote to memory of 3264 4500 LSASS.exe 100 PID 4500 wrote to memory of 3264 4500 LSASS.exe 100 PID 4500 wrote to memory of 3316 4500 LSASS.exe 103 PID 4500 wrote to memory of 3316 4500 LSASS.exe 103 PID 4500 wrote to memory of 3316 4500 LSASS.exe 103 PID 4500 wrote to memory of 4748 4500 LSASS.exe 104 PID 4500 wrote to memory of 4748 4500 LSASS.exe 104 PID 4500 wrote to memory of 4748 4500 LSASS.exe 104 PID 4500 wrote to memory of 1812 4500 LSASS.exe 108 PID 4500 wrote to memory of 1812 4500 LSASS.exe 108 PID 4500 wrote to memory of 1812 4500 LSASS.exe 108 PID 4500 wrote to memory of 4664 4500 LSASS.exe 109 PID 4500 wrote to memory of 4664 4500 LSASS.exe 109 PID 4500 wrote to memory of 4664 4500 LSASS.exe 109 PID 4500 wrote to memory of 1088 4500 LSASS.exe 112 PID 4500 wrote to memory of 1088 4500 LSASS.exe 112 PID 4500 wrote to memory of 1088 4500 LSASS.exe 112 PID 4500 wrote to memory of 3372 4500 LSASS.exe 113 PID 4500 wrote to memory of 3372 4500 LSASS.exe 113 PID 4500 wrote to memory of 3372 4500 LSASS.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\d98f926f3a2ea1308e2d80705591f91b_JC.exe"C:\Users\Admin\AppData\Local\Temp\d98f926f3a2ea1308e2d80705591f91b_JC.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Windows\LSASS.exe"C:\Windows\LSASS.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\REG.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v SysUtils /t REG_SZ /d "C:\Windows\LSASS.exe" /f3⤵
- Adds Run key to start application
PID:508
-
-
C:\Windows\SysWOW64\REG.exeREG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v SysUtils /t REG_SZ /d "C:\Windows\LSASS.exe" /f3⤵
- Adds Run key to start application
PID:5076
-
-
C:\Users\Admin\LSASS.exe"C:\Users\Admin\LSASS.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3264
-
-
C:\Windows\SysWOW64\REG.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v SysUtils /t REG_SZ /d "C:\Windows\LSASS.exe" /f3⤵
- Adds Run key to start application
PID:3316
-
-
C:\Windows\SysWOW64\REG.exeREG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v SysUtils /t REG_SZ /d "C:\Windows\LSASS.exe" /f3⤵
- Adds Run key to start application
PID:4748
-
-
C:\Windows\SysWOW64\REG.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v SysUtils /t REG_SZ /d "C:\Windows\LSASS.exe" /f3⤵
- Adds Run key to start application
PID:1812
-
-
C:\Windows\SysWOW64\REG.exeREG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v SysUtils /t REG_SZ /d "C:\Windows\LSASS.exe" /f3⤵
- Adds Run key to start application
PID:4664
-
-
C:\Windows\SysWOW64\REG.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v SysUtils /t REG_SZ /d "C:\Windows\LSASS.exe" /f3⤵
- Adds Run key to start application
PID:1088
-
-
C:\Windows\SysWOW64\REG.exeREG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v SysUtils /t REG_SZ /d "C:\Windows\LSASS.exe" /f3⤵
- Adds Run key to start application
PID:3372
-
-
-
C:\Windows\SysWOW64\REG.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v SysUtils /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\d98f926f3a2ea1308e2d80705591f91b_JC.exe" /f2⤵
- Adds Run key to start application
PID:4676
-
-
C:\Windows\SysWOW64\REG.exeREG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v SysUtils /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\d98f926f3a2ea1308e2d80705591f91b_JC.exe" /f2⤵
- Adds Run key to start application
PID:2588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
472KB
MD594c6d31a09841138ce95cbf404f28f36
SHA112c248e012e574ad151cbbea438a073becf80f2f
SHA256b8562efd9ab474112890497913f02a36da21ad329ed5cf3b835411980c61cd86
SHA5120baf64a0e8489244e1c2cb7ec5442b02ed3226899ba75e64cb57bf54ce21ddab1ba144a5f2cacae9544ffced8838356adc423f21a7ae2c051fa27955edbdc35a
-
Filesize
472KB
MD594c6d31a09841138ce95cbf404f28f36
SHA112c248e012e574ad151cbbea438a073becf80f2f
SHA256b8562efd9ab474112890497913f02a36da21ad329ed5cf3b835411980c61cd86
SHA5120baf64a0e8489244e1c2cb7ec5442b02ed3226899ba75e64cb57bf54ce21ddab1ba144a5f2cacae9544ffced8838356adc423f21a7ae2c051fa27955edbdc35a
-
Filesize
472KB
MD508bdb6cea15305e815f24cf67a31cac5
SHA185d10d5621c909f04882f73a2edc6d861cb531d7
SHA256bae136df4d8ff9efdf4ce02dbc16e861c2bfb7c6e9118ba5d7a03ec51a3f0f0a
SHA512c697c268a1875fc530cd9a3b453f05d5551c049d91bda1d49626650c496520d31e647a4fb3eb7327b8a215c3e19591cab6d223ef8c13c170b0b061d632b706b9
-
Filesize
472KB
MD508bdb6cea15305e815f24cf67a31cac5
SHA185d10d5621c909f04882f73a2edc6d861cb531d7
SHA256bae136df4d8ff9efdf4ce02dbc16e861c2bfb7c6e9118ba5d7a03ec51a3f0f0a
SHA512c697c268a1875fc530cd9a3b453f05d5551c049d91bda1d49626650c496520d31e647a4fb3eb7327b8a215c3e19591cab6d223ef8c13c170b0b061d632b706b9
-
Filesize
472KB
MD508bdb6cea15305e815f24cf67a31cac5
SHA185d10d5621c909f04882f73a2edc6d861cb531d7
SHA256bae136df4d8ff9efdf4ce02dbc16e861c2bfb7c6e9118ba5d7a03ec51a3f0f0a
SHA512c697c268a1875fc530cd9a3b453f05d5551c049d91bda1d49626650c496520d31e647a4fb3eb7327b8a215c3e19591cab6d223ef8c13c170b0b061d632b706b9