Analysis

  • max time kernel
    222s
  • max time network
    239s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2023 01:52

General

  • Target

    4f18c6ca0ec71b0750ee9ed18011596c_JC.exe

  • Size

    328KB

  • MD5

    4f18c6ca0ec71b0750ee9ed18011596c

  • SHA1

    9c89964751da79d90a03160ea341f2f795a0c7fd

  • SHA256

    85e3ad22eaa193bb05c0f2523b474bed1340984c090a9f8fae4a6d23bb0dd7e8

  • SHA512

    829bb7351a7365d66ee7281bd496d52aa41fbbd867d3841e9686f8df71a913ff931548cafdde8c2e9ea354877cf4f015f6e7c3bfb5e7f4a072b6026ca4e658c8

  • SSDEEP

    3072:oYUb5QoJ4g+Ci9RXxKZjKIz1ZdW4SrOLVSVp9LmL58HR/u:oYESRXxKhKSZI4zLVSVpRm92R/u

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 9 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Drops file in System32 directory 20 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f18c6ca0ec71b0750ee9ed18011596c_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\4f18c6ca0ec71b0750ee9ed18011596c_JC.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2956
    • C:\Windows\SysWOW64\wpyirfx.exe
      "C:\Windows\system32\wpyirfx.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:3284
      • C:\Windows\SysWOW64\wtvfo.exe
        "C:\Windows\system32\wtvfo.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:2960
        • C:\Windows\SysWOW64\wcnxdixl.exe
          "C:\Windows\system32\wcnxdixl.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Drops file in System32 directory
          • Suspicious use of WriteProcessMemory
          PID:5020
          • C:\Windows\SysWOW64\whpgwukb.exe
            "C:\Windows\system32\whpgwukb.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Drops file in System32 directory
            • Suspicious use of WriteProcessMemory
            PID:2156
            • C:\Windows\SysWOW64\wdssdt.exe
              "C:\Windows\system32\wdssdt.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Drops file in System32 directory
              • Suspicious use of WriteProcessMemory
              PID:2288
              • C:\Windows\SysWOW64\wlxsnae.exe
                "C:\Windows\system32\wlxsnae.exe"
                7⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Drops file in System32 directory
                • Suspicious use of WriteProcessMemory
                PID:4280
                • C:\Windows\SysWOW64\wjknj.exe
                  "C:\Windows\system32\wjknj.exe"
                  8⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Suspicious use of WriteProcessMemory
                  PID:3516
                  • C:\Windows\SysWOW64\wmwjvy.exe
                    "C:\Windows\system32\wmwjvy.exe"
                    9⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Suspicious use of WriteProcessMemory
                    PID:2584
                    • C:\Windows\SysWOW64\whqj.exe
                      "C:\Windows\system32\whqj.exe"
                      10⤵
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      PID:2960
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wmwjvy.exe"
                      10⤵
                        PID:3376
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wjknj.exe"
                      9⤵
                        PID:1952
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wlxsnae.exe"
                      8⤵
                        PID:4544
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wdssdt.exe"
                      7⤵
                        PID:2972
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\whpgwukb.exe"
                      6⤵
                        PID:4736
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wcnxdixl.exe"
                      5⤵
                        PID:492
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wtvfo.exe"
                      4⤵
                        PID:3308
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wpyirfx.exe"
                      3⤵
                        PID:2148
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\4f18c6ca0ec71b0750ee9ed18011596c_JC.exe"
                      2⤵
                        PID:5040

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Windows\SysWOW64\wcnxdixl.exe

                      Filesize

                      328KB

                      MD5

                      14269176b66e56970b97b1f5dd379873

                      SHA1

                      f7a61c6eb51de69cb3b193b9e2ac9ad76e9cfbed

                      SHA256

                      c3d8425ece8480aee6da253dd2f2eb5d543a20594d3c72a92e2b3117ba56cc0b

                      SHA512

                      4c6c196b774bf3f703f48ab376dbca0959d4eda62b35159a70ecab72b5648f6fce4f1044f2584519a5d011bb37cfb18d0319029c81eb581486af5a883bd9f8bc

                    • C:\Windows\SysWOW64\wcnxdixl.exe

                      Filesize

                      328KB

                      MD5

                      14269176b66e56970b97b1f5dd379873

                      SHA1

                      f7a61c6eb51de69cb3b193b9e2ac9ad76e9cfbed

                      SHA256

                      c3d8425ece8480aee6da253dd2f2eb5d543a20594d3c72a92e2b3117ba56cc0b

                      SHA512

                      4c6c196b774bf3f703f48ab376dbca0959d4eda62b35159a70ecab72b5648f6fce4f1044f2584519a5d011bb37cfb18d0319029c81eb581486af5a883bd9f8bc

                    • C:\Windows\SysWOW64\wdssdt.exe

                      Filesize

                      328KB

                      MD5

                      bbb6b755ee57f512cb17abea5ef4561d

                      SHA1

                      6b38b1d042d970e29e8dc1355f07d6967ee71966

                      SHA256

                      d974bba13e6c7a853f189fc9bff6bb7895271b7e8208bc67a50e40d442d8043d

                      SHA512

                      92011c5bbea290e612042416adf9ed049368ca09c0c0650091917b330525251410b76b056150393a68538895d01ec353df0c09722450ec3d7d8c1e6d06d174a9

                    • C:\Windows\SysWOW64\wdssdt.exe

                      Filesize

                      328KB

                      MD5

                      bbb6b755ee57f512cb17abea5ef4561d

                      SHA1

                      6b38b1d042d970e29e8dc1355f07d6967ee71966

                      SHA256

                      d974bba13e6c7a853f189fc9bff6bb7895271b7e8208bc67a50e40d442d8043d

                      SHA512

                      92011c5bbea290e612042416adf9ed049368ca09c0c0650091917b330525251410b76b056150393a68538895d01ec353df0c09722450ec3d7d8c1e6d06d174a9

                    • C:\Windows\SysWOW64\whpgwukb.exe

                      Filesize

                      328KB

                      MD5

                      86782c9b93cd21b04322e1ac65152982

                      SHA1

                      a53c6b4aacda94736efc0cce42323c543e1afafc

                      SHA256

                      4d08484fc63088488ed1085694e8488c9e9991d3e4ff315118eb2d4144a78f37

                      SHA512

                      cf357c8679c2f0895f3c868acb7d817088d4e74f162d684e3626554ca4e8334e53d4dffe162c988cb09b38c4c64f673a21230d5f44dd7a6dbbde49ce1b5511c3

                    • C:\Windows\SysWOW64\whpgwukb.exe

                      Filesize

                      328KB

                      MD5

                      86782c9b93cd21b04322e1ac65152982

                      SHA1

                      a53c6b4aacda94736efc0cce42323c543e1afafc

                      SHA256

                      4d08484fc63088488ed1085694e8488c9e9991d3e4ff315118eb2d4144a78f37

                      SHA512

                      cf357c8679c2f0895f3c868acb7d817088d4e74f162d684e3626554ca4e8334e53d4dffe162c988cb09b38c4c64f673a21230d5f44dd7a6dbbde49ce1b5511c3

                    • C:\Windows\SysWOW64\whqj.exe

                      Filesize

                      328KB

                      MD5

                      9a61f7b012a89be42455a4d9c4817964

                      SHA1

                      acf735d62a1633217cdaf8f725a21ce9ea427fa2

                      SHA256

                      16cac1a9ee1a0cfc39f5215ec59fcb437bf1ff7783dbe329e340b09ab4f289de

                      SHA512

                      692897c6bdb75ba88db2c092ddf59821cebfee8ac2a49c8e51a3a7f1757d117d18db33eea614fbea0d78fdf71514a7a86f072f5fa45ccf6626c94b08bb29a67a

                    • C:\Windows\SysWOW64\whqj.exe

                      Filesize

                      328KB

                      MD5

                      9a61f7b012a89be42455a4d9c4817964

                      SHA1

                      acf735d62a1633217cdaf8f725a21ce9ea427fa2

                      SHA256

                      16cac1a9ee1a0cfc39f5215ec59fcb437bf1ff7783dbe329e340b09ab4f289de

                      SHA512

                      692897c6bdb75ba88db2c092ddf59821cebfee8ac2a49c8e51a3a7f1757d117d18db33eea614fbea0d78fdf71514a7a86f072f5fa45ccf6626c94b08bb29a67a

                    • C:\Windows\SysWOW64\wjknj.exe

                      Filesize

                      328KB

                      MD5

                      7713f0596b9fec9c5ff71e7d9b3f1621

                      SHA1

                      80dbbc3ca6b1519d67ca264a00127dcd1adcbdf3

                      SHA256

                      e0de83d251eae903a4519cdb2fa9b584d78a0a14d48229beaad020f28e1fd8e3

                      SHA512

                      58631702fd5d89ff9929e827420b11114dd3f1e2ad2120344e3d3b690d58717bbf461d1567f56487cb298089dd99c3188c44acc449aeb7f3cb8013ff140bd067

                    • C:\Windows\SysWOW64\wjknj.exe

                      Filesize

                      328KB

                      MD5

                      7713f0596b9fec9c5ff71e7d9b3f1621

                      SHA1

                      80dbbc3ca6b1519d67ca264a00127dcd1adcbdf3

                      SHA256

                      e0de83d251eae903a4519cdb2fa9b584d78a0a14d48229beaad020f28e1fd8e3

                      SHA512

                      58631702fd5d89ff9929e827420b11114dd3f1e2ad2120344e3d3b690d58717bbf461d1567f56487cb298089dd99c3188c44acc449aeb7f3cb8013ff140bd067

                    • C:\Windows\SysWOW64\wlxsnae.exe

                      Filesize

                      328KB

                      MD5

                      8f1871d7e25fc28d58edd80b4a3e8ad9

                      SHA1

                      b36616808b5751d9881126cef531ecb43e942f12

                      SHA256

                      454318b5beebea23eea2456bb85b82a4040b969dcf2ab5b14a34393c226037f0

                      SHA512

                      9cf0541c9025e1773bd35a1b326daf577c5d067e4fbba4147e9ad3b275b7d4023c839f6d9619b1ad1daeb8ab77d02fe275d7f48b6e073d5d45ca9da130be48da

                    • C:\Windows\SysWOW64\wlxsnae.exe

                      Filesize

                      328KB

                      MD5

                      8f1871d7e25fc28d58edd80b4a3e8ad9

                      SHA1

                      b36616808b5751d9881126cef531ecb43e942f12

                      SHA256

                      454318b5beebea23eea2456bb85b82a4040b969dcf2ab5b14a34393c226037f0

                      SHA512

                      9cf0541c9025e1773bd35a1b326daf577c5d067e4fbba4147e9ad3b275b7d4023c839f6d9619b1ad1daeb8ab77d02fe275d7f48b6e073d5d45ca9da130be48da

                    • C:\Windows\SysWOW64\wmwjvy.exe

                      Filesize

                      328KB

                      MD5

                      9e49c64a2ad222b294c3c28c03509a24

                      SHA1

                      bee3b8f0f68f2f98c5ef34103bee2a7e56ccb358

                      SHA256

                      03c6dea920201dec432c98deed4d40df1339a6bd8bb161b29d253693455900ff

                      SHA512

                      c46b721c7b8abe0cd0802dd275406f7a6e73a4fc72f9de03aac7506f18d64d820fac6f9ece5a4d4e0abd2c8d2487666024d10af043b17b89d83dc7250f48d202

                    • C:\Windows\SysWOW64\wmwjvy.exe

                      Filesize

                      328KB

                      MD5

                      9e49c64a2ad222b294c3c28c03509a24

                      SHA1

                      bee3b8f0f68f2f98c5ef34103bee2a7e56ccb358

                      SHA256

                      03c6dea920201dec432c98deed4d40df1339a6bd8bb161b29d253693455900ff

                      SHA512

                      c46b721c7b8abe0cd0802dd275406f7a6e73a4fc72f9de03aac7506f18d64d820fac6f9ece5a4d4e0abd2c8d2487666024d10af043b17b89d83dc7250f48d202

                    • C:\Windows\SysWOW64\wpyirfx.exe

                      Filesize

                      328KB

                      MD5

                      9fc67496fb3c591199f6ea79267af87b

                      SHA1

                      92e66c8e4ca39d2bea164fee837956df608f7c24

                      SHA256

                      f58b2f168567bcce7d05cbb85d481486bae028fc3f0972fa4e08b8b2b8045d7a

                      SHA512

                      a34a3e24abc0cbfd0ec0c2255cf67e2fc7b1929602d0058937a9d632efceb60fcb6e58d32b9e2468a002397952626a6c42587c59be445fd37a6e3adeb3317079

                    • C:\Windows\SysWOW64\wpyirfx.exe

                      Filesize

                      328KB

                      MD5

                      9fc67496fb3c591199f6ea79267af87b

                      SHA1

                      92e66c8e4ca39d2bea164fee837956df608f7c24

                      SHA256

                      f58b2f168567bcce7d05cbb85d481486bae028fc3f0972fa4e08b8b2b8045d7a

                      SHA512

                      a34a3e24abc0cbfd0ec0c2255cf67e2fc7b1929602d0058937a9d632efceb60fcb6e58d32b9e2468a002397952626a6c42587c59be445fd37a6e3adeb3317079

                    • C:\Windows\SysWOW64\wpyirfx.exe

                      Filesize

                      328KB

                      MD5

                      9fc67496fb3c591199f6ea79267af87b

                      SHA1

                      92e66c8e4ca39d2bea164fee837956df608f7c24

                      SHA256

                      f58b2f168567bcce7d05cbb85d481486bae028fc3f0972fa4e08b8b2b8045d7a

                      SHA512

                      a34a3e24abc0cbfd0ec0c2255cf67e2fc7b1929602d0058937a9d632efceb60fcb6e58d32b9e2468a002397952626a6c42587c59be445fd37a6e3adeb3317079

                    • C:\Windows\SysWOW64\wtvfo.exe

                      Filesize

                      328KB

                      MD5

                      a15e6d00c1aa4f90326cf502e1765461

                      SHA1

                      9be04cba9e1755a8c2234202c2b923f44d2f24ac

                      SHA256

                      d8858ec91c8d06127b6f50a0385dca20dfbe07914633fddc2f38d1c3bf72aa1e

                      SHA512

                      8a45a26c2912d60a7ac799fc9046eab9865d242c663107001115e12f0fd1df422a2a2976c7035ad9c0a41db06b7332364cec3c24e0cb5f578f839459fdfaa33c

                    • C:\Windows\SysWOW64\wtvfo.exe

                      Filesize

                      328KB

                      MD5

                      a15e6d00c1aa4f90326cf502e1765461

                      SHA1

                      9be04cba9e1755a8c2234202c2b923f44d2f24ac

                      SHA256

                      d8858ec91c8d06127b6f50a0385dca20dfbe07914633fddc2f38d1c3bf72aa1e

                      SHA512

                      8a45a26c2912d60a7ac799fc9046eab9865d242c663107001115e12f0fd1df422a2a2976c7035ad9c0a41db06b7332364cec3c24e0cb5f578f839459fdfaa33c

                    • memory/2156-49-0x0000000000400000-0x0000000000422000-memory.dmp

                      Filesize

                      136KB

                    • memory/2156-55-0x0000000000400000-0x0000000000422000-memory.dmp

                      Filesize

                      136KB

                    • memory/2156-43-0x0000000000400000-0x0000000000422000-memory.dmp

                      Filesize

                      136KB

                    • memory/2288-65-0x0000000000400000-0x0000000000422000-memory.dmp

                      Filesize

                      136KB

                    • memory/2584-97-0x0000000000400000-0x0000000000422000-memory.dmp

                      Filesize

                      136KB

                    • memory/2956-10-0x0000000000400000-0x0000000000422000-memory.dmp

                      Filesize

                      136KB

                    • memory/2956-0-0x0000000000400000-0x0000000000422000-memory.dmp

                      Filesize

                      136KB

                    • memory/2960-26-0x0000000000400000-0x0000000000422000-memory.dmp

                      Filesize

                      136KB

                    • memory/2960-20-0x0000000000400000-0x0000000000422000-memory.dmp

                      Filesize

                      136KB

                    • memory/2960-32-0x0000000000400000-0x0000000000422000-memory.dmp

                      Filesize

                      136KB

                    • memory/3284-21-0x0000000000400000-0x0000000000422000-memory.dmp

                      Filesize

                      136KB

                    • memory/3516-76-0x0000000000400000-0x0000000000422000-memory.dmp

                      Filesize

                      136KB

                    • memory/3516-87-0x0000000000400000-0x0000000000422000-memory.dmp

                      Filesize

                      136KB

                    • memory/4280-77-0x0000000000400000-0x0000000000422000-memory.dmp

                      Filesize

                      136KB

                    • memory/4280-74-0x0000000000400000-0x0000000000422000-memory.dmp

                      Filesize

                      136KB

                    • memory/5020-37-0x0000000000400000-0x0000000000422000-memory.dmp

                      Filesize

                      136KB

                    • memory/5020-44-0x0000000000400000-0x0000000000422000-memory.dmp

                      Filesize

                      136KB