Analysis
-
max time kernel
155s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 18:51
Static task
static1
Behavioral task
behavioral1
Sample
0616ef0135c6c2fb598b17a2debf7ac5_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0616ef0135c6c2fb598b17a2debf7ac5_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
0616ef0135c6c2fb598b17a2debf7ac5_JC.exe
-
Size
60KB
-
MD5
0616ef0135c6c2fb598b17a2debf7ac5
-
SHA1
84e4d9bb1a6c2113a966daebdd446bff2f07f5bc
-
SHA256
6d44d06a595c4c857d9486dd3ae708e8184c5414910e2bcc4422776e61e42b57
-
SHA512
64dd83eacc0a15ad552e8589fb0733756e9954240732960cff5f03d66f8faad009a2a6b0c37917a73c5604161f2c310a2e817c4ddff0e7d6a558f54f42359b39
-
SSDEEP
768:+OcMqeRVszjRGXRuVHiFXVDNKcoC+OFNONtqe0Vszq6IlGPsO8kDR/2BTGSY:VlqwVs3AX4HiFFDNKYQfqhVsk3qohY
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 0616ef0135c6c2fb598b17a2debf7ac5_JC.exe -
Loads dropped DLL 2 IoCs
pid Process 5068 0616ef0135c6c2fb598b17a2debf7ac5_JC.exe 5068 0616ef0135c6c2fb598b17a2debf7ac5_JC.exe -
Checks for any installed AV software in registry 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Eset\Nod\CurrentVersion\Info\ 0616ef0135c6c2fb598b17a2debf7ac5_JC.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\Internet Explorer\OnlO0r.dll 0616ef0135c6c2fb598b17a2debf7ac5_JC.exe File created C:\Program Files (x86)\Common Files\fjOs0r.dll 0616ef0135c6c2fb598b17a2debf7ac5_JC.exe File created C:\Program Files\Internet Explorer\OnlO0r.bak 0616ef0135c6c2fb598b17a2debf7ac5_JC.exe File opened for modification C:\Program Files\Internet Explorer\OnlO0r.bak 0616ef0135c6c2fb598b17a2debf7ac5_JC.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5068 0616ef0135c6c2fb598b17a2debf7ac5_JC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0616ef0135c6c2fb598b17a2debf7ac5_JC.exe"C:\Users\Admin\AppData\Local\Temp\0616ef0135c6c2fb598b17a2debf7ac5_JC.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Checks for any installed AV software in registry
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:5068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5e4134d1f9582fb0822cfc0553d8e8eea
SHA164e46d8d566ec92865caea2a071da846ee6249c9
SHA25601d9e71b9d862aea073cc46f6f987e90434d131944280abf632464bc3e44fc3c
SHA51280627504d9e9b39ce2fe6a43e6fefb43828b11bfbd0913598896e07571b616f3076884461482fc4826fe2023bfd1f4c0f51f3e6bb7ff655c308fa190e23c2d1b
-
Filesize
31KB
MD5e4134d1f9582fb0822cfc0553d8e8eea
SHA164e46d8d566ec92865caea2a071da846ee6249c9
SHA25601d9e71b9d862aea073cc46f6f987e90434d131944280abf632464bc3e44fc3c
SHA51280627504d9e9b39ce2fe6a43e6fefb43828b11bfbd0913598896e07571b616f3076884461482fc4826fe2023bfd1f4c0f51f3e6bb7ff655c308fa190e23c2d1b
-
Filesize
31KB
MD5e4134d1f9582fb0822cfc0553d8e8eea
SHA164e46d8d566ec92865caea2a071da846ee6249c9
SHA25601d9e71b9d862aea073cc46f6f987e90434d131944280abf632464bc3e44fc3c
SHA51280627504d9e9b39ce2fe6a43e6fefb43828b11bfbd0913598896e07571b616f3076884461482fc4826fe2023bfd1f4c0f51f3e6bb7ff655c308fa190e23c2d1b