Analysis

  • max time kernel
    18s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2023 00:55

General

  • Target

    1f2fd9f5bd935796629c5a50dd8dada92992a2020aa41c2db444630ca2ba72eb_JC.exe

  • Size

    1.3MB

  • MD5

    bd619c2eac464daef651344ce2d88847

  • SHA1

    54e5e75aff9f8672facf8d82efdf4ebc3e9044f4

  • SHA256

    1f2fd9f5bd935796629c5a50dd8dada92992a2020aa41c2db444630ca2ba72eb

  • SHA512

    870b88cd108487ec44689261bed5cc7a6426f46a346382d482e0e0ec4c4e2e2f79bb2cb6f5d745d05225be994e7f7b980ca557b41f146b045799d40874c5d515

  • SSDEEP

    24576:NyHtS9hAtuW3mXiT25itgMZkgdqaroNfBWV9u7JzAtOvU2z81yfrW:oHAvAgWaiT2hMZH3oNom7Jc+7j

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1f2fd9f5bd935796629c5a50dd8dada92992a2020aa41c2db444630ca2ba72eb_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\1f2fd9f5bd935796629c5a50dd8dada92992a2020aa41c2db444630ca2ba72eb_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7788112.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7788112.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2620
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2996772.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2996772.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2732
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8456660.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8456660.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2996
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1854296.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1854296.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2356
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:2744
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2356 -s 268
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:2604

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7788112.exe

      Filesize

      1.2MB

      MD5

      8ca697dfe81995680576f43210e6eea1

      SHA1

      e855741c80528c89fa5b544865b1e2550c6ab22e

      SHA256

      3698883ae0311177f1ead5d89fd93d9137f31eb26d8dd1fe0c756a8752066069

      SHA512

      354b9b976225b39b7d14b399d71e9905bcf9bbb46af8b74bc115ce5c04ee57d5e1429fdf9483328eb9c06e13a71a91a9d51bacc3e831c5156bcee720ac07d0ed

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7788112.exe

      Filesize

      1.2MB

      MD5

      8ca697dfe81995680576f43210e6eea1

      SHA1

      e855741c80528c89fa5b544865b1e2550c6ab22e

      SHA256

      3698883ae0311177f1ead5d89fd93d9137f31eb26d8dd1fe0c756a8752066069

      SHA512

      354b9b976225b39b7d14b399d71e9905bcf9bbb46af8b74bc115ce5c04ee57d5e1429fdf9483328eb9c06e13a71a91a9d51bacc3e831c5156bcee720ac07d0ed

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2996772.exe

      Filesize

      925KB

      MD5

      faeb29b137ef43fbdc5ec40e9e666523

      SHA1

      a62de39fd4f0195230612df710f229b922b61190

      SHA256

      aea5402340b7c23af7fe001a63e835baa020fc133623c29172e9010ed6a749d3

      SHA512

      82b72a4d017b0b171728eb4d725213d63c95ea8983080f3557be0e264b0b01b2ba42fcd3471d51b1755c4b0388b201f4245059d3aa9cd1e6eacb987c439384be

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2996772.exe

      Filesize

      925KB

      MD5

      faeb29b137ef43fbdc5ec40e9e666523

      SHA1

      a62de39fd4f0195230612df710f229b922b61190

      SHA256

      aea5402340b7c23af7fe001a63e835baa020fc133623c29172e9010ed6a749d3

      SHA512

      82b72a4d017b0b171728eb4d725213d63c95ea8983080f3557be0e264b0b01b2ba42fcd3471d51b1755c4b0388b201f4245059d3aa9cd1e6eacb987c439384be

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8456660.exe

      Filesize

      534KB

      MD5

      868750fb82b016fb61311b0ee6d71a0b

      SHA1

      44a5c19fac784eb73956180e2d7a8cb0529779cc

      SHA256

      ea0d94bfc6abbce4d5ee88a986239125e15a5e2937178fbc56f6add9d9c02b96

      SHA512

      026bf2f000d440516e599d82b832e5cdcce70eecd08c8e664a909a8cb7dd09093678bffd9720eb224d9361d159ecd41d1438d2538e930edda49ce2ed2170f482

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8456660.exe

      Filesize

      534KB

      MD5

      868750fb82b016fb61311b0ee6d71a0b

      SHA1

      44a5c19fac784eb73956180e2d7a8cb0529779cc

      SHA256

      ea0d94bfc6abbce4d5ee88a986239125e15a5e2937178fbc56f6add9d9c02b96

      SHA512

      026bf2f000d440516e599d82b832e5cdcce70eecd08c8e664a909a8cb7dd09093678bffd9720eb224d9361d159ecd41d1438d2538e930edda49ce2ed2170f482

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1854296.exe

      Filesize

      1.0MB

      MD5

      55cf512fd472520f6edd1ff6b561ba16

      SHA1

      01b7f6db53420bf8f71a7c44ef496ce1842d9def

      SHA256

      24b146be5d973fc4dbc23101480f4d4df4d6a1344968b5d0add9910ddd8825b3

      SHA512

      5503ebbfcb13e469cb06b3afe13020a40b9987c7d13185260c895b290becc21d4fd47329fd5f0435b8ed86dd4a1446d8dbcd9fdedbaea73c99cc9b0ccccb77ed

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1854296.exe

      Filesize

      1.0MB

      MD5

      55cf512fd472520f6edd1ff6b561ba16

      SHA1

      01b7f6db53420bf8f71a7c44ef496ce1842d9def

      SHA256

      24b146be5d973fc4dbc23101480f4d4df4d6a1344968b5d0add9910ddd8825b3

      SHA512

      5503ebbfcb13e469cb06b3afe13020a40b9987c7d13185260c895b290becc21d4fd47329fd5f0435b8ed86dd4a1446d8dbcd9fdedbaea73c99cc9b0ccccb77ed

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1854296.exe

      Filesize

      1.0MB

      MD5

      55cf512fd472520f6edd1ff6b561ba16

      SHA1

      01b7f6db53420bf8f71a7c44ef496ce1842d9def

      SHA256

      24b146be5d973fc4dbc23101480f4d4df4d6a1344968b5d0add9910ddd8825b3

      SHA512

      5503ebbfcb13e469cb06b3afe13020a40b9987c7d13185260c895b290becc21d4fd47329fd5f0435b8ed86dd4a1446d8dbcd9fdedbaea73c99cc9b0ccccb77ed

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v7788112.exe

      Filesize

      1.2MB

      MD5

      8ca697dfe81995680576f43210e6eea1

      SHA1

      e855741c80528c89fa5b544865b1e2550c6ab22e

      SHA256

      3698883ae0311177f1ead5d89fd93d9137f31eb26d8dd1fe0c756a8752066069

      SHA512

      354b9b976225b39b7d14b399d71e9905bcf9bbb46af8b74bc115ce5c04ee57d5e1429fdf9483328eb9c06e13a71a91a9d51bacc3e831c5156bcee720ac07d0ed

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v7788112.exe

      Filesize

      1.2MB

      MD5

      8ca697dfe81995680576f43210e6eea1

      SHA1

      e855741c80528c89fa5b544865b1e2550c6ab22e

      SHA256

      3698883ae0311177f1ead5d89fd93d9137f31eb26d8dd1fe0c756a8752066069

      SHA512

      354b9b976225b39b7d14b399d71e9905bcf9bbb46af8b74bc115ce5c04ee57d5e1429fdf9483328eb9c06e13a71a91a9d51bacc3e831c5156bcee720ac07d0ed

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v2996772.exe

      Filesize

      925KB

      MD5

      faeb29b137ef43fbdc5ec40e9e666523

      SHA1

      a62de39fd4f0195230612df710f229b922b61190

      SHA256

      aea5402340b7c23af7fe001a63e835baa020fc133623c29172e9010ed6a749d3

      SHA512

      82b72a4d017b0b171728eb4d725213d63c95ea8983080f3557be0e264b0b01b2ba42fcd3471d51b1755c4b0388b201f4245059d3aa9cd1e6eacb987c439384be

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v2996772.exe

      Filesize

      925KB

      MD5

      faeb29b137ef43fbdc5ec40e9e666523

      SHA1

      a62de39fd4f0195230612df710f229b922b61190

      SHA256

      aea5402340b7c23af7fe001a63e835baa020fc133623c29172e9010ed6a749d3

      SHA512

      82b72a4d017b0b171728eb4d725213d63c95ea8983080f3557be0e264b0b01b2ba42fcd3471d51b1755c4b0388b201f4245059d3aa9cd1e6eacb987c439384be

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v8456660.exe

      Filesize

      534KB

      MD5

      868750fb82b016fb61311b0ee6d71a0b

      SHA1

      44a5c19fac784eb73956180e2d7a8cb0529779cc

      SHA256

      ea0d94bfc6abbce4d5ee88a986239125e15a5e2937178fbc56f6add9d9c02b96

      SHA512

      026bf2f000d440516e599d82b832e5cdcce70eecd08c8e664a909a8cb7dd09093678bffd9720eb224d9361d159ecd41d1438d2538e930edda49ce2ed2170f482

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v8456660.exe

      Filesize

      534KB

      MD5

      868750fb82b016fb61311b0ee6d71a0b

      SHA1

      44a5c19fac784eb73956180e2d7a8cb0529779cc

      SHA256

      ea0d94bfc6abbce4d5ee88a986239125e15a5e2937178fbc56f6add9d9c02b96

      SHA512

      026bf2f000d440516e599d82b832e5cdcce70eecd08c8e664a909a8cb7dd09093678bffd9720eb224d9361d159ecd41d1438d2538e930edda49ce2ed2170f482

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a1854296.exe

      Filesize

      1.0MB

      MD5

      55cf512fd472520f6edd1ff6b561ba16

      SHA1

      01b7f6db53420bf8f71a7c44ef496ce1842d9def

      SHA256

      24b146be5d973fc4dbc23101480f4d4df4d6a1344968b5d0add9910ddd8825b3

      SHA512

      5503ebbfcb13e469cb06b3afe13020a40b9987c7d13185260c895b290becc21d4fd47329fd5f0435b8ed86dd4a1446d8dbcd9fdedbaea73c99cc9b0ccccb77ed

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a1854296.exe

      Filesize

      1.0MB

      MD5

      55cf512fd472520f6edd1ff6b561ba16

      SHA1

      01b7f6db53420bf8f71a7c44ef496ce1842d9def

      SHA256

      24b146be5d973fc4dbc23101480f4d4df4d6a1344968b5d0add9910ddd8825b3

      SHA512

      5503ebbfcb13e469cb06b3afe13020a40b9987c7d13185260c895b290becc21d4fd47329fd5f0435b8ed86dd4a1446d8dbcd9fdedbaea73c99cc9b0ccccb77ed

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a1854296.exe

      Filesize

      1.0MB

      MD5

      55cf512fd472520f6edd1ff6b561ba16

      SHA1

      01b7f6db53420bf8f71a7c44ef496ce1842d9def

      SHA256

      24b146be5d973fc4dbc23101480f4d4df4d6a1344968b5d0add9910ddd8825b3

      SHA512

      5503ebbfcb13e469cb06b3afe13020a40b9987c7d13185260c895b290becc21d4fd47329fd5f0435b8ed86dd4a1446d8dbcd9fdedbaea73c99cc9b0ccccb77ed

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a1854296.exe

      Filesize

      1.0MB

      MD5

      55cf512fd472520f6edd1ff6b561ba16

      SHA1

      01b7f6db53420bf8f71a7c44ef496ce1842d9def

      SHA256

      24b146be5d973fc4dbc23101480f4d4df4d6a1344968b5d0add9910ddd8825b3

      SHA512

      5503ebbfcb13e469cb06b3afe13020a40b9987c7d13185260c895b290becc21d4fd47329fd5f0435b8ed86dd4a1446d8dbcd9fdedbaea73c99cc9b0ccccb77ed

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a1854296.exe

      Filesize

      1.0MB

      MD5

      55cf512fd472520f6edd1ff6b561ba16

      SHA1

      01b7f6db53420bf8f71a7c44ef496ce1842d9def

      SHA256

      24b146be5d973fc4dbc23101480f4d4df4d6a1344968b5d0add9910ddd8825b3

      SHA512

      5503ebbfcb13e469cb06b3afe13020a40b9987c7d13185260c895b290becc21d4fd47329fd5f0435b8ed86dd4a1446d8dbcd9fdedbaea73c99cc9b0ccccb77ed

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a1854296.exe

      Filesize

      1.0MB

      MD5

      55cf512fd472520f6edd1ff6b561ba16

      SHA1

      01b7f6db53420bf8f71a7c44ef496ce1842d9def

      SHA256

      24b146be5d973fc4dbc23101480f4d4df4d6a1344968b5d0add9910ddd8825b3

      SHA512

      5503ebbfcb13e469cb06b3afe13020a40b9987c7d13185260c895b290becc21d4fd47329fd5f0435b8ed86dd4a1446d8dbcd9fdedbaea73c99cc9b0ccccb77ed

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a1854296.exe

      Filesize

      1.0MB

      MD5

      55cf512fd472520f6edd1ff6b561ba16

      SHA1

      01b7f6db53420bf8f71a7c44ef496ce1842d9def

      SHA256

      24b146be5d973fc4dbc23101480f4d4df4d6a1344968b5d0add9910ddd8825b3

      SHA512

      5503ebbfcb13e469cb06b3afe13020a40b9987c7d13185260c895b290becc21d4fd47329fd5f0435b8ed86dd4a1446d8dbcd9fdedbaea73c99cc9b0ccccb77ed

    • memory/2744-51-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2744-53-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2744-55-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/2744-56-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2744-58-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2744-60-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2744-61-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2744-49-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2744-47-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2744-45-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2744-43-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB