Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 01:39
Static task
static1
Behavioral task
behavioral1
Sample
64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe
-
Size
825KB
-
MD5
64ff33cf9a3d079c63c0b0b4d42391d0
-
SHA1
43499a4f8b59401b3c679f314f83c20995ec2f4f
-
SHA256
301606b8412f2e21101dbaadfa1898eb3dd60f4ebede80f2eae4165ddf3ddcca
-
SHA512
53a64cd2683b70bbc0a360c8a63a680bee242665a28e143ec4653076746e5105edfac12373412e4ab077c38d071898a067230cb94f0ee7309c3bfb695023ceee
-
SSDEEP
6144:jASq+03d8KhKtL5vbXLMxqHe/rDLrDqfSfR2yh4A9xjZjk+cIi:jASq+0K/VbXLz+/HfDuSfRRrZ5i
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 812 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 812 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 812 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 812 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 812 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 812 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 812 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 812 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 812 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 812 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 812 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 812 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 812 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 812 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 812 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 812 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 3052 rundll32.exe 3052 rundll32.exe 3052 rundll32.exe 3052 rundll32.exe 3052 rundll32.exe 3052 rundll32.exe 3052 rundll32.exe 3052 rundll32.exe 3052 rundll32.exe 3052 rundll32.exe 3052 rundll32.exe 3052 rundll32.exe 3052 rundll32.exe 3052 rundll32.exe 3052 rundll32.exe 3052 rundll32.exe 3052 rundll32.exe 3052 rundll32.exe 3052 rundll32.exe 3052 rundll32.exe 3052 rundll32.exe 3052 rundll32.exe 3052 rundll32.exe 3052 rundll32.exe 3052 rundll32.exe 3052 rundll32.exe 3052 rundll32.exe 424 winlogon.exe 424 winlogon.exe 424 winlogon.exe 424 winlogon.exe 424 winlogon.exe 424 winlogon.exe 424 winlogon.exe 424 winlogon.exe 424 winlogon.exe 424 winlogon.exe 424 winlogon.exe 424 winlogon.exe 424 winlogon.exe 424 winlogon.exe 424 winlogon.exe 424 winlogon.exe 424 winlogon.exe 424 winlogon.exe 424 winlogon.exe 424 winlogon.exe 424 winlogon.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1200 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3052 rundll32.exe Token: SeDebugPrivilege 424 winlogon.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 812 wrote to memory of 3052 812 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 28 PID 812 wrote to memory of 3052 812 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 28 PID 812 wrote to memory of 3052 812 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 28 PID 812 wrote to memory of 3052 812 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 28 PID 812 wrote to memory of 3052 812 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 28 PID 812 wrote to memory of 3052 812 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 28 PID 812 wrote to memory of 3052 812 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 28 PID 812 wrote to memory of 3052 812 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 28 PID 812 wrote to memory of 3052 812 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 28 PID 3052 wrote to memory of 424 3052 rundll32.exe 2 PID 424 wrote to memory of 1104 424 winlogon.exe 21 PID 424 wrote to memory of 1200 424 winlogon.exe 19 PID 424 wrote to memory of 1812 424 winlogon.exe 23 PID 3052 wrote to memory of 1104 3052 rundll32.exe 21
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:424
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe"2⤵
- Checks BIOS information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\system32\rundll32.exe-go twmyrn.dll3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3052
-
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1104
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD508f4b48d2613b856b750f2f2462badd7
SHA1405fb0d5695f7ce84b0087cf67542067b0dba147
SHA256525ab16aab58d0b9f42c8dbab047f0ef4f13e55b43acac66b29e927f801ece14
SHA5123aaecbd59eb08d00007e474000d7c8669d4b7d64321f71406d2ce916721a958d9b2acbacace000a4b1b1a125f277409ada43db2ec85d6a81451f16c9f832f75e