Analysis
-
max time kernel
18s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 00:55
Static task
static1
Behavioral task
behavioral1
Sample
1f2fd9f5bd935796629c5a50dd8dada92992a2020aa41c2db444630ca2ba72eb_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1f2fd9f5bd935796629c5a50dd8dada92992a2020aa41c2db444630ca2ba72eb_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
1f2fd9f5bd935796629c5a50dd8dada92992a2020aa41c2db444630ca2ba72eb_JC.exe
-
Size
1.3MB
-
MD5
bd619c2eac464daef651344ce2d88847
-
SHA1
54e5e75aff9f8672facf8d82efdf4ebc3e9044f4
-
SHA256
1f2fd9f5bd935796629c5a50dd8dada92992a2020aa41c2db444630ca2ba72eb
-
SHA512
870b88cd108487ec44689261bed5cc7a6426f46a346382d482e0e0ec4c4e2e2f79bb2cb6f5d745d05225be994e7f7b980ca557b41f146b045799d40874c5d515
-
SSDEEP
24576:NyHtS9hAtuW3mXiT25itgMZkgdqaroNfBWV9u7JzAtOvU2z81yfrW:oHAvAgWaiT2hMZH3oNom7Jc+7j
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2620 v7788112.exe 2732 v2996772.exe 2996 v8456660.exe 2356 a1854296.exe -
Loads dropped DLL 13 IoCs
pid Process 2228 1f2fd9f5bd935796629c5a50dd8dada92992a2020aa41c2db444630ca2ba72eb_JC.exe 2620 v7788112.exe 2620 v7788112.exe 2732 v2996772.exe 2732 v2996772.exe 2996 v8456660.exe 2996 v8456660.exe 2996 v8456660.exe 2356 a1854296.exe 2604 WerFault.exe 2604 WerFault.exe 2604 WerFault.exe 2604 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v7788112.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v2996772.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v8456660.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1f2fd9f5bd935796629c5a50dd8dada92992a2020aa41c2db444630ca2ba72eb_JC.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2356 set thread context of 2744 2356 a1854296.exe 33 -
Program crash 1 IoCs
pid pid_target Process procid_target 2604 2356 WerFault.exe 31 -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2620 2228 1f2fd9f5bd935796629c5a50dd8dada92992a2020aa41c2db444630ca2ba72eb_JC.exe 28 PID 2228 wrote to memory of 2620 2228 1f2fd9f5bd935796629c5a50dd8dada92992a2020aa41c2db444630ca2ba72eb_JC.exe 28 PID 2228 wrote to memory of 2620 2228 1f2fd9f5bd935796629c5a50dd8dada92992a2020aa41c2db444630ca2ba72eb_JC.exe 28 PID 2228 wrote to memory of 2620 2228 1f2fd9f5bd935796629c5a50dd8dada92992a2020aa41c2db444630ca2ba72eb_JC.exe 28 PID 2228 wrote to memory of 2620 2228 1f2fd9f5bd935796629c5a50dd8dada92992a2020aa41c2db444630ca2ba72eb_JC.exe 28 PID 2228 wrote to memory of 2620 2228 1f2fd9f5bd935796629c5a50dd8dada92992a2020aa41c2db444630ca2ba72eb_JC.exe 28 PID 2228 wrote to memory of 2620 2228 1f2fd9f5bd935796629c5a50dd8dada92992a2020aa41c2db444630ca2ba72eb_JC.exe 28 PID 2620 wrote to memory of 2732 2620 v7788112.exe 29 PID 2620 wrote to memory of 2732 2620 v7788112.exe 29 PID 2620 wrote to memory of 2732 2620 v7788112.exe 29 PID 2620 wrote to memory of 2732 2620 v7788112.exe 29 PID 2620 wrote to memory of 2732 2620 v7788112.exe 29 PID 2620 wrote to memory of 2732 2620 v7788112.exe 29 PID 2620 wrote to memory of 2732 2620 v7788112.exe 29 PID 2732 wrote to memory of 2996 2732 v2996772.exe 30 PID 2732 wrote to memory of 2996 2732 v2996772.exe 30 PID 2732 wrote to memory of 2996 2732 v2996772.exe 30 PID 2732 wrote to memory of 2996 2732 v2996772.exe 30 PID 2732 wrote to memory of 2996 2732 v2996772.exe 30 PID 2732 wrote to memory of 2996 2732 v2996772.exe 30 PID 2732 wrote to memory of 2996 2732 v2996772.exe 30 PID 2996 wrote to memory of 2356 2996 v8456660.exe 31 PID 2996 wrote to memory of 2356 2996 v8456660.exe 31 PID 2996 wrote to memory of 2356 2996 v8456660.exe 31 PID 2996 wrote to memory of 2356 2996 v8456660.exe 31 PID 2996 wrote to memory of 2356 2996 v8456660.exe 31 PID 2996 wrote to memory of 2356 2996 v8456660.exe 31 PID 2996 wrote to memory of 2356 2996 v8456660.exe 31 PID 2356 wrote to memory of 2744 2356 a1854296.exe 33 PID 2356 wrote to memory of 2744 2356 a1854296.exe 33 PID 2356 wrote to memory of 2744 2356 a1854296.exe 33 PID 2356 wrote to memory of 2744 2356 a1854296.exe 33 PID 2356 wrote to memory of 2744 2356 a1854296.exe 33 PID 2356 wrote to memory of 2744 2356 a1854296.exe 33 PID 2356 wrote to memory of 2744 2356 a1854296.exe 33 PID 2356 wrote to memory of 2744 2356 a1854296.exe 33 PID 2356 wrote to memory of 2744 2356 a1854296.exe 33 PID 2356 wrote to memory of 2744 2356 a1854296.exe 33 PID 2356 wrote to memory of 2744 2356 a1854296.exe 33 PID 2356 wrote to memory of 2744 2356 a1854296.exe 33 PID 2356 wrote to memory of 2744 2356 a1854296.exe 33 PID 2356 wrote to memory of 2744 2356 a1854296.exe 33 PID 2356 wrote to memory of 2604 2356 a1854296.exe 34 PID 2356 wrote to memory of 2604 2356 a1854296.exe 34 PID 2356 wrote to memory of 2604 2356 a1854296.exe 34 PID 2356 wrote to memory of 2604 2356 a1854296.exe 34 PID 2356 wrote to memory of 2604 2356 a1854296.exe 34 PID 2356 wrote to memory of 2604 2356 a1854296.exe 34 PID 2356 wrote to memory of 2604 2356 a1854296.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f2fd9f5bd935796629c5a50dd8dada92992a2020aa41c2db444630ca2ba72eb_JC.exe"C:\Users\Admin\AppData\Local\Temp\1f2fd9f5bd935796629c5a50dd8dada92992a2020aa41c2db444630ca2ba72eb_JC.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7788112.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7788112.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2996772.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2996772.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8456660.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8456660.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1854296.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1854296.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2356 -s 2686⤵
- Loads dropped DLL
- Program crash
PID:2604
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD58ca697dfe81995680576f43210e6eea1
SHA1e855741c80528c89fa5b544865b1e2550c6ab22e
SHA2563698883ae0311177f1ead5d89fd93d9137f31eb26d8dd1fe0c756a8752066069
SHA512354b9b976225b39b7d14b399d71e9905bcf9bbb46af8b74bc115ce5c04ee57d5e1429fdf9483328eb9c06e13a71a91a9d51bacc3e831c5156bcee720ac07d0ed
-
Filesize
1.2MB
MD58ca697dfe81995680576f43210e6eea1
SHA1e855741c80528c89fa5b544865b1e2550c6ab22e
SHA2563698883ae0311177f1ead5d89fd93d9137f31eb26d8dd1fe0c756a8752066069
SHA512354b9b976225b39b7d14b399d71e9905bcf9bbb46af8b74bc115ce5c04ee57d5e1429fdf9483328eb9c06e13a71a91a9d51bacc3e831c5156bcee720ac07d0ed
-
Filesize
925KB
MD5faeb29b137ef43fbdc5ec40e9e666523
SHA1a62de39fd4f0195230612df710f229b922b61190
SHA256aea5402340b7c23af7fe001a63e835baa020fc133623c29172e9010ed6a749d3
SHA51282b72a4d017b0b171728eb4d725213d63c95ea8983080f3557be0e264b0b01b2ba42fcd3471d51b1755c4b0388b201f4245059d3aa9cd1e6eacb987c439384be
-
Filesize
925KB
MD5faeb29b137ef43fbdc5ec40e9e666523
SHA1a62de39fd4f0195230612df710f229b922b61190
SHA256aea5402340b7c23af7fe001a63e835baa020fc133623c29172e9010ed6a749d3
SHA51282b72a4d017b0b171728eb4d725213d63c95ea8983080f3557be0e264b0b01b2ba42fcd3471d51b1755c4b0388b201f4245059d3aa9cd1e6eacb987c439384be
-
Filesize
534KB
MD5868750fb82b016fb61311b0ee6d71a0b
SHA144a5c19fac784eb73956180e2d7a8cb0529779cc
SHA256ea0d94bfc6abbce4d5ee88a986239125e15a5e2937178fbc56f6add9d9c02b96
SHA512026bf2f000d440516e599d82b832e5cdcce70eecd08c8e664a909a8cb7dd09093678bffd9720eb224d9361d159ecd41d1438d2538e930edda49ce2ed2170f482
-
Filesize
534KB
MD5868750fb82b016fb61311b0ee6d71a0b
SHA144a5c19fac784eb73956180e2d7a8cb0529779cc
SHA256ea0d94bfc6abbce4d5ee88a986239125e15a5e2937178fbc56f6add9d9c02b96
SHA512026bf2f000d440516e599d82b832e5cdcce70eecd08c8e664a909a8cb7dd09093678bffd9720eb224d9361d159ecd41d1438d2538e930edda49ce2ed2170f482
-
Filesize
1.0MB
MD555cf512fd472520f6edd1ff6b561ba16
SHA101b7f6db53420bf8f71a7c44ef496ce1842d9def
SHA25624b146be5d973fc4dbc23101480f4d4df4d6a1344968b5d0add9910ddd8825b3
SHA5125503ebbfcb13e469cb06b3afe13020a40b9987c7d13185260c895b290becc21d4fd47329fd5f0435b8ed86dd4a1446d8dbcd9fdedbaea73c99cc9b0ccccb77ed
-
Filesize
1.0MB
MD555cf512fd472520f6edd1ff6b561ba16
SHA101b7f6db53420bf8f71a7c44ef496ce1842d9def
SHA25624b146be5d973fc4dbc23101480f4d4df4d6a1344968b5d0add9910ddd8825b3
SHA5125503ebbfcb13e469cb06b3afe13020a40b9987c7d13185260c895b290becc21d4fd47329fd5f0435b8ed86dd4a1446d8dbcd9fdedbaea73c99cc9b0ccccb77ed
-
Filesize
1.0MB
MD555cf512fd472520f6edd1ff6b561ba16
SHA101b7f6db53420bf8f71a7c44ef496ce1842d9def
SHA25624b146be5d973fc4dbc23101480f4d4df4d6a1344968b5d0add9910ddd8825b3
SHA5125503ebbfcb13e469cb06b3afe13020a40b9987c7d13185260c895b290becc21d4fd47329fd5f0435b8ed86dd4a1446d8dbcd9fdedbaea73c99cc9b0ccccb77ed
-
Filesize
1.2MB
MD58ca697dfe81995680576f43210e6eea1
SHA1e855741c80528c89fa5b544865b1e2550c6ab22e
SHA2563698883ae0311177f1ead5d89fd93d9137f31eb26d8dd1fe0c756a8752066069
SHA512354b9b976225b39b7d14b399d71e9905bcf9bbb46af8b74bc115ce5c04ee57d5e1429fdf9483328eb9c06e13a71a91a9d51bacc3e831c5156bcee720ac07d0ed
-
Filesize
1.2MB
MD58ca697dfe81995680576f43210e6eea1
SHA1e855741c80528c89fa5b544865b1e2550c6ab22e
SHA2563698883ae0311177f1ead5d89fd93d9137f31eb26d8dd1fe0c756a8752066069
SHA512354b9b976225b39b7d14b399d71e9905bcf9bbb46af8b74bc115ce5c04ee57d5e1429fdf9483328eb9c06e13a71a91a9d51bacc3e831c5156bcee720ac07d0ed
-
Filesize
925KB
MD5faeb29b137ef43fbdc5ec40e9e666523
SHA1a62de39fd4f0195230612df710f229b922b61190
SHA256aea5402340b7c23af7fe001a63e835baa020fc133623c29172e9010ed6a749d3
SHA51282b72a4d017b0b171728eb4d725213d63c95ea8983080f3557be0e264b0b01b2ba42fcd3471d51b1755c4b0388b201f4245059d3aa9cd1e6eacb987c439384be
-
Filesize
925KB
MD5faeb29b137ef43fbdc5ec40e9e666523
SHA1a62de39fd4f0195230612df710f229b922b61190
SHA256aea5402340b7c23af7fe001a63e835baa020fc133623c29172e9010ed6a749d3
SHA51282b72a4d017b0b171728eb4d725213d63c95ea8983080f3557be0e264b0b01b2ba42fcd3471d51b1755c4b0388b201f4245059d3aa9cd1e6eacb987c439384be
-
Filesize
534KB
MD5868750fb82b016fb61311b0ee6d71a0b
SHA144a5c19fac784eb73956180e2d7a8cb0529779cc
SHA256ea0d94bfc6abbce4d5ee88a986239125e15a5e2937178fbc56f6add9d9c02b96
SHA512026bf2f000d440516e599d82b832e5cdcce70eecd08c8e664a909a8cb7dd09093678bffd9720eb224d9361d159ecd41d1438d2538e930edda49ce2ed2170f482
-
Filesize
534KB
MD5868750fb82b016fb61311b0ee6d71a0b
SHA144a5c19fac784eb73956180e2d7a8cb0529779cc
SHA256ea0d94bfc6abbce4d5ee88a986239125e15a5e2937178fbc56f6add9d9c02b96
SHA512026bf2f000d440516e599d82b832e5cdcce70eecd08c8e664a909a8cb7dd09093678bffd9720eb224d9361d159ecd41d1438d2538e930edda49ce2ed2170f482
-
Filesize
1.0MB
MD555cf512fd472520f6edd1ff6b561ba16
SHA101b7f6db53420bf8f71a7c44ef496ce1842d9def
SHA25624b146be5d973fc4dbc23101480f4d4df4d6a1344968b5d0add9910ddd8825b3
SHA5125503ebbfcb13e469cb06b3afe13020a40b9987c7d13185260c895b290becc21d4fd47329fd5f0435b8ed86dd4a1446d8dbcd9fdedbaea73c99cc9b0ccccb77ed
-
Filesize
1.0MB
MD555cf512fd472520f6edd1ff6b561ba16
SHA101b7f6db53420bf8f71a7c44ef496ce1842d9def
SHA25624b146be5d973fc4dbc23101480f4d4df4d6a1344968b5d0add9910ddd8825b3
SHA5125503ebbfcb13e469cb06b3afe13020a40b9987c7d13185260c895b290becc21d4fd47329fd5f0435b8ed86dd4a1446d8dbcd9fdedbaea73c99cc9b0ccccb77ed
-
Filesize
1.0MB
MD555cf512fd472520f6edd1ff6b561ba16
SHA101b7f6db53420bf8f71a7c44ef496ce1842d9def
SHA25624b146be5d973fc4dbc23101480f4d4df4d6a1344968b5d0add9910ddd8825b3
SHA5125503ebbfcb13e469cb06b3afe13020a40b9987c7d13185260c895b290becc21d4fd47329fd5f0435b8ed86dd4a1446d8dbcd9fdedbaea73c99cc9b0ccccb77ed
-
Filesize
1.0MB
MD555cf512fd472520f6edd1ff6b561ba16
SHA101b7f6db53420bf8f71a7c44ef496ce1842d9def
SHA25624b146be5d973fc4dbc23101480f4d4df4d6a1344968b5d0add9910ddd8825b3
SHA5125503ebbfcb13e469cb06b3afe13020a40b9987c7d13185260c895b290becc21d4fd47329fd5f0435b8ed86dd4a1446d8dbcd9fdedbaea73c99cc9b0ccccb77ed
-
Filesize
1.0MB
MD555cf512fd472520f6edd1ff6b561ba16
SHA101b7f6db53420bf8f71a7c44ef496ce1842d9def
SHA25624b146be5d973fc4dbc23101480f4d4df4d6a1344968b5d0add9910ddd8825b3
SHA5125503ebbfcb13e469cb06b3afe13020a40b9987c7d13185260c895b290becc21d4fd47329fd5f0435b8ed86dd4a1446d8dbcd9fdedbaea73c99cc9b0ccccb77ed
-
Filesize
1.0MB
MD555cf512fd472520f6edd1ff6b561ba16
SHA101b7f6db53420bf8f71a7c44ef496ce1842d9def
SHA25624b146be5d973fc4dbc23101480f4d4df4d6a1344968b5d0add9910ddd8825b3
SHA5125503ebbfcb13e469cb06b3afe13020a40b9987c7d13185260c895b290becc21d4fd47329fd5f0435b8ed86dd4a1446d8dbcd9fdedbaea73c99cc9b0ccccb77ed
-
Filesize
1.0MB
MD555cf512fd472520f6edd1ff6b561ba16
SHA101b7f6db53420bf8f71a7c44ef496ce1842d9def
SHA25624b146be5d973fc4dbc23101480f4d4df4d6a1344968b5d0add9910ddd8825b3
SHA5125503ebbfcb13e469cb06b3afe13020a40b9987c7d13185260c895b290becc21d4fd47329fd5f0435b8ed86dd4a1446d8dbcd9fdedbaea73c99cc9b0ccccb77ed