Analysis
-
max time kernel
222s -
max time network
239s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 01:52
Static task
static1
Behavioral task
behavioral1
Sample
4f18c6ca0ec71b0750ee9ed18011596c_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
4f18c6ca0ec71b0750ee9ed18011596c_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
4f18c6ca0ec71b0750ee9ed18011596c_JC.exe
-
Size
328KB
-
MD5
4f18c6ca0ec71b0750ee9ed18011596c
-
SHA1
9c89964751da79d90a03160ea341f2f795a0c7fd
-
SHA256
85e3ad22eaa193bb05c0f2523b474bed1340984c090a9f8fae4a6d23bb0dd7e8
-
SHA512
829bb7351a7365d66ee7281bd496d52aa41fbbd867d3841e9686f8df71a913ff931548cafdde8c2e9ea354877cf4f015f6e7c3bfb5e7f4a072b6026ca4e658c8
-
SSDEEP
3072:oYUb5QoJ4g+Ci9RXxKZjKIz1ZdW4SrOLVSVp9LmL58HR/u:oYESRXxKhKSZI4zLVSVpRm92R/u
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 9 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation wtvfo.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation whpgwukb.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation wdssdt.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation wjknj.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation wmwjvy.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation 4f18c6ca0ec71b0750ee9ed18011596c_JC.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation wpyirfx.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation wcnxdixl.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation wlxsnae.exe -
Executes dropped EXE 9 IoCs
pid Process 3284 wpyirfx.exe 2960 wtvfo.exe 5020 wcnxdixl.exe 2156 whpgwukb.exe 2288 wdssdt.exe 4280 wlxsnae.exe 3516 wjknj.exe 2584 wmwjvy.exe 2960 whqj.exe -
Drops file in System32 directory 20 IoCs
description ioc Process File created C:\Windows\SysWOW64\wpyirfx.exe 4f18c6ca0ec71b0750ee9ed18011596c_JC.exe File created C:\Windows\SysWOW64\wcnxdixl.exe wtvfo.exe File opened for modification C:\Windows\SysWOW64\wcnxdixl.exe wtvfo.exe File created C:\Windows\SysWOW64\whpgwukb.exe wcnxdixl.exe File created C:\Windows\SysWOW64\wlxsnae.exe wdssdt.exe File created C:\Windows\SysWOW64\whqj.exe wmwjvy.exe File opened for modification C:\Windows\SysWOW64\wpyirfx.exe 4f18c6ca0ec71b0750ee9ed18011596c_JC.exe File opened for modification C:\Windows\SysWOW64\whpgwukb.exe wcnxdixl.exe File opened for modification C:\Windows\SysWOW64\wdssdt.exe whpgwukb.exe File created C:\Windows\SysWOW64\wjknj.exe wlxsnae.exe File opened for modification C:\Windows\SysWOW64\wtvfo.exe wpyirfx.exe File opened for modification C:\Windows\SysWOW64\wlxsnae.exe wdssdt.exe File opened for modification C:\Windows\SysWOW64\wjknj.exe wlxsnae.exe File opened for modification C:\Windows\SysWOW64\wmwjvy.exe wjknj.exe File opened for modification C:\Windows\SysWOW64\whqj.exe wmwjvy.exe File created C:\Windows\SysWOW64\woqqxqqf.exe whqj.exe File created C:\Windows\SysWOW64\wtvfo.exe wpyirfx.exe File created C:\Windows\SysWOW64\wdssdt.exe whpgwukb.exe File created C:\Windows\SysWOW64\wmwjvy.exe wjknj.exe File opened for modification C:\Windows\SysWOW64\woqqxqqf.exe whqj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 2956 wrote to memory of 3284 2956 4f18c6ca0ec71b0750ee9ed18011596c_JC.exe 93 PID 2956 wrote to memory of 3284 2956 4f18c6ca0ec71b0750ee9ed18011596c_JC.exe 93 PID 2956 wrote to memory of 3284 2956 4f18c6ca0ec71b0750ee9ed18011596c_JC.exe 93 PID 2956 wrote to memory of 5040 2956 4f18c6ca0ec71b0750ee9ed18011596c_JC.exe 95 PID 2956 wrote to memory of 5040 2956 4f18c6ca0ec71b0750ee9ed18011596c_JC.exe 95 PID 2956 wrote to memory of 5040 2956 4f18c6ca0ec71b0750ee9ed18011596c_JC.exe 95 PID 3284 wrote to memory of 2960 3284 wpyirfx.exe 98 PID 3284 wrote to memory of 2960 3284 wpyirfx.exe 98 PID 3284 wrote to memory of 2960 3284 wpyirfx.exe 98 PID 3284 wrote to memory of 2148 3284 wpyirfx.exe 99 PID 3284 wrote to memory of 2148 3284 wpyirfx.exe 99 PID 3284 wrote to memory of 2148 3284 wpyirfx.exe 99 PID 2960 wrote to memory of 5020 2960 wtvfo.exe 101 PID 2960 wrote to memory of 5020 2960 wtvfo.exe 101 PID 2960 wrote to memory of 5020 2960 wtvfo.exe 101 PID 2960 wrote to memory of 3308 2960 wtvfo.exe 102 PID 2960 wrote to memory of 3308 2960 wtvfo.exe 102 PID 2960 wrote to memory of 3308 2960 wtvfo.exe 102 PID 5020 wrote to memory of 2156 5020 wcnxdixl.exe 106 PID 5020 wrote to memory of 2156 5020 wcnxdixl.exe 106 PID 5020 wrote to memory of 2156 5020 wcnxdixl.exe 106 PID 5020 wrote to memory of 492 5020 wcnxdixl.exe 107 PID 5020 wrote to memory of 492 5020 wcnxdixl.exe 107 PID 5020 wrote to memory of 492 5020 wcnxdixl.exe 107 PID 2156 wrote to memory of 2288 2156 whpgwukb.exe 110 PID 2156 wrote to memory of 2288 2156 whpgwukb.exe 110 PID 2156 wrote to memory of 2288 2156 whpgwukb.exe 110 PID 2156 wrote to memory of 4736 2156 whpgwukb.exe 113 PID 2156 wrote to memory of 4736 2156 whpgwukb.exe 113 PID 2156 wrote to memory of 4736 2156 whpgwukb.exe 113 PID 2288 wrote to memory of 4280 2288 wdssdt.exe 117 PID 2288 wrote to memory of 4280 2288 wdssdt.exe 117 PID 2288 wrote to memory of 4280 2288 wdssdt.exe 117 PID 2288 wrote to memory of 2972 2288 wdssdt.exe 119 PID 2288 wrote to memory of 2972 2288 wdssdt.exe 119 PID 2288 wrote to memory of 2972 2288 wdssdt.exe 119 PID 4280 wrote to memory of 3516 4280 wlxsnae.exe 120 PID 4280 wrote to memory of 3516 4280 wlxsnae.exe 120 PID 4280 wrote to memory of 3516 4280 wlxsnae.exe 120 PID 4280 wrote to memory of 4544 4280 wlxsnae.exe 121 PID 4280 wrote to memory of 4544 4280 wlxsnae.exe 121 PID 4280 wrote to memory of 4544 4280 wlxsnae.exe 121 PID 3516 wrote to memory of 2584 3516 wjknj.exe 123 PID 3516 wrote to memory of 2584 3516 wjknj.exe 123 PID 3516 wrote to memory of 2584 3516 wjknj.exe 123 PID 3516 wrote to memory of 1952 3516 wjknj.exe 124 PID 3516 wrote to memory of 1952 3516 wjknj.exe 124 PID 3516 wrote to memory of 1952 3516 wjknj.exe 124 PID 2584 wrote to memory of 2960 2584 wmwjvy.exe 126 PID 2584 wrote to memory of 2960 2584 wmwjvy.exe 126 PID 2584 wrote to memory of 2960 2584 wmwjvy.exe 126 PID 2584 wrote to memory of 3376 2584 wmwjvy.exe 127 PID 2584 wrote to memory of 3376 2584 wmwjvy.exe 127 PID 2584 wrote to memory of 3376 2584 wmwjvy.exe 127
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f18c6ca0ec71b0750ee9ed18011596c_JC.exe"C:\Users\Admin\AppData\Local\Temp\4f18c6ca0ec71b0750ee9ed18011596c_JC.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\wpyirfx.exe"C:\Windows\system32\wpyirfx.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Windows\SysWOW64\wtvfo.exe"C:\Windows\system32\wtvfo.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\wcnxdixl.exe"C:\Windows\system32\wcnxdixl.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\whpgwukb.exe"C:\Windows\system32\whpgwukb.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\wdssdt.exe"C:\Windows\system32\wdssdt.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\wlxsnae.exe"C:\Windows\system32\wlxsnae.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\SysWOW64\wjknj.exe"C:\Windows\system32\wjknj.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\SysWOW64\wmwjvy.exe"C:\Windows\system32\wmwjvy.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\whqj.exe"C:\Windows\system32\whqj.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2960
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wmwjvy.exe"10⤵PID:3376
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wjknj.exe"9⤵PID:1952
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wlxsnae.exe"8⤵PID:4544
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wdssdt.exe"7⤵PID:2972
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\whpgwukb.exe"6⤵PID:4736
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wcnxdixl.exe"5⤵PID:492
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wtvfo.exe"4⤵PID:3308
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wpyirfx.exe"3⤵PID:2148
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\4f18c6ca0ec71b0750ee9ed18011596c_JC.exe"2⤵PID:5040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
328KB
MD514269176b66e56970b97b1f5dd379873
SHA1f7a61c6eb51de69cb3b193b9e2ac9ad76e9cfbed
SHA256c3d8425ece8480aee6da253dd2f2eb5d543a20594d3c72a92e2b3117ba56cc0b
SHA5124c6c196b774bf3f703f48ab376dbca0959d4eda62b35159a70ecab72b5648f6fce4f1044f2584519a5d011bb37cfb18d0319029c81eb581486af5a883bd9f8bc
-
Filesize
328KB
MD514269176b66e56970b97b1f5dd379873
SHA1f7a61c6eb51de69cb3b193b9e2ac9ad76e9cfbed
SHA256c3d8425ece8480aee6da253dd2f2eb5d543a20594d3c72a92e2b3117ba56cc0b
SHA5124c6c196b774bf3f703f48ab376dbca0959d4eda62b35159a70ecab72b5648f6fce4f1044f2584519a5d011bb37cfb18d0319029c81eb581486af5a883bd9f8bc
-
Filesize
328KB
MD5bbb6b755ee57f512cb17abea5ef4561d
SHA16b38b1d042d970e29e8dc1355f07d6967ee71966
SHA256d974bba13e6c7a853f189fc9bff6bb7895271b7e8208bc67a50e40d442d8043d
SHA51292011c5bbea290e612042416adf9ed049368ca09c0c0650091917b330525251410b76b056150393a68538895d01ec353df0c09722450ec3d7d8c1e6d06d174a9
-
Filesize
328KB
MD5bbb6b755ee57f512cb17abea5ef4561d
SHA16b38b1d042d970e29e8dc1355f07d6967ee71966
SHA256d974bba13e6c7a853f189fc9bff6bb7895271b7e8208bc67a50e40d442d8043d
SHA51292011c5bbea290e612042416adf9ed049368ca09c0c0650091917b330525251410b76b056150393a68538895d01ec353df0c09722450ec3d7d8c1e6d06d174a9
-
Filesize
328KB
MD586782c9b93cd21b04322e1ac65152982
SHA1a53c6b4aacda94736efc0cce42323c543e1afafc
SHA2564d08484fc63088488ed1085694e8488c9e9991d3e4ff315118eb2d4144a78f37
SHA512cf357c8679c2f0895f3c868acb7d817088d4e74f162d684e3626554ca4e8334e53d4dffe162c988cb09b38c4c64f673a21230d5f44dd7a6dbbde49ce1b5511c3
-
Filesize
328KB
MD586782c9b93cd21b04322e1ac65152982
SHA1a53c6b4aacda94736efc0cce42323c543e1afafc
SHA2564d08484fc63088488ed1085694e8488c9e9991d3e4ff315118eb2d4144a78f37
SHA512cf357c8679c2f0895f3c868acb7d817088d4e74f162d684e3626554ca4e8334e53d4dffe162c988cb09b38c4c64f673a21230d5f44dd7a6dbbde49ce1b5511c3
-
Filesize
328KB
MD59a61f7b012a89be42455a4d9c4817964
SHA1acf735d62a1633217cdaf8f725a21ce9ea427fa2
SHA25616cac1a9ee1a0cfc39f5215ec59fcb437bf1ff7783dbe329e340b09ab4f289de
SHA512692897c6bdb75ba88db2c092ddf59821cebfee8ac2a49c8e51a3a7f1757d117d18db33eea614fbea0d78fdf71514a7a86f072f5fa45ccf6626c94b08bb29a67a
-
Filesize
328KB
MD59a61f7b012a89be42455a4d9c4817964
SHA1acf735d62a1633217cdaf8f725a21ce9ea427fa2
SHA25616cac1a9ee1a0cfc39f5215ec59fcb437bf1ff7783dbe329e340b09ab4f289de
SHA512692897c6bdb75ba88db2c092ddf59821cebfee8ac2a49c8e51a3a7f1757d117d18db33eea614fbea0d78fdf71514a7a86f072f5fa45ccf6626c94b08bb29a67a
-
Filesize
328KB
MD57713f0596b9fec9c5ff71e7d9b3f1621
SHA180dbbc3ca6b1519d67ca264a00127dcd1adcbdf3
SHA256e0de83d251eae903a4519cdb2fa9b584d78a0a14d48229beaad020f28e1fd8e3
SHA51258631702fd5d89ff9929e827420b11114dd3f1e2ad2120344e3d3b690d58717bbf461d1567f56487cb298089dd99c3188c44acc449aeb7f3cb8013ff140bd067
-
Filesize
328KB
MD57713f0596b9fec9c5ff71e7d9b3f1621
SHA180dbbc3ca6b1519d67ca264a00127dcd1adcbdf3
SHA256e0de83d251eae903a4519cdb2fa9b584d78a0a14d48229beaad020f28e1fd8e3
SHA51258631702fd5d89ff9929e827420b11114dd3f1e2ad2120344e3d3b690d58717bbf461d1567f56487cb298089dd99c3188c44acc449aeb7f3cb8013ff140bd067
-
Filesize
328KB
MD58f1871d7e25fc28d58edd80b4a3e8ad9
SHA1b36616808b5751d9881126cef531ecb43e942f12
SHA256454318b5beebea23eea2456bb85b82a4040b969dcf2ab5b14a34393c226037f0
SHA5129cf0541c9025e1773bd35a1b326daf577c5d067e4fbba4147e9ad3b275b7d4023c839f6d9619b1ad1daeb8ab77d02fe275d7f48b6e073d5d45ca9da130be48da
-
Filesize
328KB
MD58f1871d7e25fc28d58edd80b4a3e8ad9
SHA1b36616808b5751d9881126cef531ecb43e942f12
SHA256454318b5beebea23eea2456bb85b82a4040b969dcf2ab5b14a34393c226037f0
SHA5129cf0541c9025e1773bd35a1b326daf577c5d067e4fbba4147e9ad3b275b7d4023c839f6d9619b1ad1daeb8ab77d02fe275d7f48b6e073d5d45ca9da130be48da
-
Filesize
328KB
MD59e49c64a2ad222b294c3c28c03509a24
SHA1bee3b8f0f68f2f98c5ef34103bee2a7e56ccb358
SHA25603c6dea920201dec432c98deed4d40df1339a6bd8bb161b29d253693455900ff
SHA512c46b721c7b8abe0cd0802dd275406f7a6e73a4fc72f9de03aac7506f18d64d820fac6f9ece5a4d4e0abd2c8d2487666024d10af043b17b89d83dc7250f48d202
-
Filesize
328KB
MD59e49c64a2ad222b294c3c28c03509a24
SHA1bee3b8f0f68f2f98c5ef34103bee2a7e56ccb358
SHA25603c6dea920201dec432c98deed4d40df1339a6bd8bb161b29d253693455900ff
SHA512c46b721c7b8abe0cd0802dd275406f7a6e73a4fc72f9de03aac7506f18d64d820fac6f9ece5a4d4e0abd2c8d2487666024d10af043b17b89d83dc7250f48d202
-
Filesize
328KB
MD59fc67496fb3c591199f6ea79267af87b
SHA192e66c8e4ca39d2bea164fee837956df608f7c24
SHA256f58b2f168567bcce7d05cbb85d481486bae028fc3f0972fa4e08b8b2b8045d7a
SHA512a34a3e24abc0cbfd0ec0c2255cf67e2fc7b1929602d0058937a9d632efceb60fcb6e58d32b9e2468a002397952626a6c42587c59be445fd37a6e3adeb3317079
-
Filesize
328KB
MD59fc67496fb3c591199f6ea79267af87b
SHA192e66c8e4ca39d2bea164fee837956df608f7c24
SHA256f58b2f168567bcce7d05cbb85d481486bae028fc3f0972fa4e08b8b2b8045d7a
SHA512a34a3e24abc0cbfd0ec0c2255cf67e2fc7b1929602d0058937a9d632efceb60fcb6e58d32b9e2468a002397952626a6c42587c59be445fd37a6e3adeb3317079
-
Filesize
328KB
MD59fc67496fb3c591199f6ea79267af87b
SHA192e66c8e4ca39d2bea164fee837956df608f7c24
SHA256f58b2f168567bcce7d05cbb85d481486bae028fc3f0972fa4e08b8b2b8045d7a
SHA512a34a3e24abc0cbfd0ec0c2255cf67e2fc7b1929602d0058937a9d632efceb60fcb6e58d32b9e2468a002397952626a6c42587c59be445fd37a6e3adeb3317079
-
Filesize
328KB
MD5a15e6d00c1aa4f90326cf502e1765461
SHA19be04cba9e1755a8c2234202c2b923f44d2f24ac
SHA256d8858ec91c8d06127b6f50a0385dca20dfbe07914633fddc2f38d1c3bf72aa1e
SHA5128a45a26c2912d60a7ac799fc9046eab9865d242c663107001115e12f0fd1df422a2a2976c7035ad9c0a41db06b7332364cec3c24e0cb5f578f839459fdfaa33c
-
Filesize
328KB
MD5a15e6d00c1aa4f90326cf502e1765461
SHA19be04cba9e1755a8c2234202c2b923f44d2f24ac
SHA256d8858ec91c8d06127b6f50a0385dca20dfbe07914633fddc2f38d1c3bf72aa1e
SHA5128a45a26c2912d60a7ac799fc9046eab9865d242c663107001115e12f0fd1df422a2a2976c7035ad9c0a41db06b7332364cec3c24e0cb5f578f839459fdfaa33c