General
-
Target
e9da55aa306b3e45af08293f5698bcba_JC.exe
-
Size
109KB
-
Sample
231012-wh1cbshe78
-
MD5
e9da55aa306b3e45af08293f5698bcba
-
SHA1
d63c1d9717af322ebd5d698f7fab8068f4410877
-
SHA256
6388257817308d851ba774273341df0d195a1210830a430d152423e73625264c
-
SHA512
195f9e341e1d60fca24b62623dfd472191d59807ee92fd206e4ce00fdf9751bf8708d2cffbbe5842e852921556afdc511b60b23f807b876097f56ca7634f03ad
-
SSDEEP
1536:jRsjdwILDU7MN8t6Pe/Inouy8VTZRsjdwILDU7MN8t6Pe/Inouy8VT9AG4RsfUx:jOniXI2IoutNZOniXI2IoutNn4n
Behavioral task
behavioral1
Sample
e9da55aa306b3e45af08293f5698bcba_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e9da55aa306b3e45af08293f5698bcba_JC.exe
Resource
win10v2004-20230915-en
Malware Config
Targets
-
-
Target
e9da55aa306b3e45af08293f5698bcba_JC.exe
-
Size
109KB
-
MD5
e9da55aa306b3e45af08293f5698bcba
-
SHA1
d63c1d9717af322ebd5d698f7fab8068f4410877
-
SHA256
6388257817308d851ba774273341df0d195a1210830a430d152423e73625264c
-
SHA512
195f9e341e1d60fca24b62623dfd472191d59807ee92fd206e4ce00fdf9751bf8708d2cffbbe5842e852921556afdc511b60b23f807b876097f56ca7634f03ad
-
SSDEEP
1536:jRsjdwILDU7MN8t6Pe/Inouy8VTZRsjdwILDU7MN8t6Pe/Inouy8VT9AG4RsfUx:jOniXI2IoutNZOniXI2IoutNn4n
Score10/10-
Modifies WinLogon for persistence
-
Modifies visibility of file extensions in Explorer
-
Modifies visiblity of hidden/system files in Explorer
-
Disables RegEdit via registry modification
-
Disables use of System Restore points
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
7