Analysis
-
max time kernel
147s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 11:54
Static task
static1
Behavioral task
behavioral1
Sample
a59e5080bc8db85569321aaa3d91a810_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a59e5080bc8db85569321aaa3d91a810_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
a59e5080bc8db85569321aaa3d91a810_JC.exe
-
Size
5.9MB
-
MD5
a59e5080bc8db85569321aaa3d91a810
-
SHA1
9f5b8f027ec8b4a188236961f8e3b260f6748180
-
SHA256
ebf00b4085d40901fa76f8ebaa4d0f4a171d5dabb816da27f5621ed11944554d
-
SHA512
7f179c078cf3b74e208160e79908e6c16e12c530d2b8a3b789f8ca8acba8680df7abefd276965ca5c67fade3bedba6e10bd8bf96bcebf94187183631a950db0a
-
SSDEEP
98304:njj6l/ydwugGr8DwuwnUwMg6C7Vy3KrytzoqqA5e5UA6rO3XO07WsnYmKPCwD3Y5:jjM/MrwDwu4Mm7V2Kry3ZE6q3XTCsYNw
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe sIRC4.exe" a59e5080bc8db85569321aaa3d91a810_JC.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\xdccPrograms\7z.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File created C:\Windows\SysWOW64\DC++ Share\ielowutil.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File created C:\Windows\SysWOW64\DC++ Share\appletviewer.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File created C:\Windows\SysWOW64\DC++ Share\idlj.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File created C:\Windows\SysWOW64\DC++ Share\InputPersonalization.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File created C:\Windows\SysWOW64\DC++ Share\mip.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\mip.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File created C:\Windows\SysWOW64\DC++ Share\chrome_pwa_launcher.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\chrome.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\java.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File created C:\Windows\SysWOW64\xdccPrograms\appvcleaner.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File created C:\Windows\SysWOW64\xdccPrograms\IntegratedOffice.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File created C:\Windows\SysWOW64\DC++ Share\chrmstp.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File created C:\Windows\SysWOW64\DC++ Share\notification_helper.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\appletviewer.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\MavInject32.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File created C:\Windows\SysWOW64\DC++ Share\OfficeClickToRun.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File created C:\Windows\SysWOW64\DC++ Share\ExtExport.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File created C:\Windows\SysWOW64\DC++ Share\OSE.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\chrmstp.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\OfficeC2RClient.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\ielowutil.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\jabswitch.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File created C:\Windows\SysWOW64\DC++ Share\jarsigner.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File created C:\Windows\SysWOW64\DC++ Share\java-rmi.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCX98B.tmp a59e5080bc8db85569321aaa3d91a810_JC.exe File created C:\Windows\SysWOW64\sIRC4.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\7z.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCX9FC.tmp a59e5080bc8db85569321aaa3d91a810_JC.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\AppVShNotify.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File created C:\Windows\SysWOW64\xdccPrograms\InspectorOfficeGadget.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\msinfo32.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File created C:\Windows\SysWOW64\DC++ Share\elevation_service.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\ieinstal.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File created C:\Windows\SysWOW64\DC++ Share\extcheck.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File opened for modification C:\Windows\SysWOW64\sIRC4.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File created C:\Windows\SysWOW64\xdccPrograms\7zG.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCX9DC.tmp a59e5080bc8db85569321aaa3d91a810_JC.exe File created C:\Windows\SysWOW64\DC++ Share\chrome.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\extcheck.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File created C:\Windows\SysWOW64\DC++ Share\javadoc.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\office2016setup.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\InspectorOfficeGadget.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File created C:\Windows\SysWOW64\DC++ Share\LICLUA.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File created C:\Windows\SysWOW64\DC++ Share\java.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File created C:\Windows\SysWOW64\DC++ Share\javafxpackager.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File created C:\Windows\SysWOW64\xdccPrograms\7zFM.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\7zG.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\java-rmi.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\appvcleaner.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\IntegratedOffice.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File created C:\Windows\SysWOW64\DC++ Share\ieinstal.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\iexplore.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File created C:\Windows\SysWOW64\DC++ Share\jabswitch.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File created C:\Windows\SysWOW64\DC++ Share\MavInject32.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File created C:\Windows\SysWOW64\DC++ Share\msinfo32.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File created C:\Windows\SysWOW64\DC++ Share\VSTOInstaller.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\idlj.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\jar.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\javafxpackager.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File created C:\Windows\SysWOW64\xdccPrograms\office2016setup.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File created C:\Windows\SysWOW64\DC++ Share\TabTip.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File created C:\Windows\SysWOW64\DC++ Share\iexplore.exe a59e5080bc8db85569321aaa3d91a810_JC.exe File created C:\Windows\SysWOW64\xdccPrograms\AppVShNotify.exe a59e5080bc8db85569321aaa3d91a810_JC.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5bf2b45c44c163235c51b55167501052a
SHA1ef022b1ded3fb67730258f37bf257f06b80138a4
SHA2561318d6d1b30d2268c33565e1d1d160e421d986ccff7a6807e4e910c4dbeeb27d
SHA5127f9554bf9cdafebbb9b535a94dce0da985ba655b9a7a7fff78d55851e391e6308e824dee3acf0a23cc367298dad182fbfac76e695ac0aa431e69fa5a3f871b62
-
Filesize
6.0MB
MD55e3542cc23f41f8d9be321206534daac
SHA1e75e0a7f5ce5efef3d84dd4facfaf470651f48e1
SHA25603e5e89900891b8842a7dffabaeb54dcb4355691d7b8176ec2e3e798d4ad078e
SHA512ea833b6ec6b7017df62e8bd7b1f310967732a735826ced0d1ac486d4764f7e5d1873635579dfe740da275d7ee1fdce4e9a6a4e2ade86d4d26dd62e4b52bd9cd8