Analysis
-
max time kernel
155s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 01:39
Static task
static1
Behavioral task
behavioral1
Sample
64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe
-
Size
825KB
-
MD5
64ff33cf9a3d079c63c0b0b4d42391d0
-
SHA1
43499a4f8b59401b3c679f314f83c20995ec2f4f
-
SHA256
301606b8412f2e21101dbaadfa1898eb3dd60f4ebede80f2eae4165ddf3ddcca
-
SHA512
53a64cd2683b70bbc0a360c8a63a680bee242665a28e143ec4653076746e5105edfac12373412e4ab077c38d071898a067230cb94f0ee7309c3bfb695023ceee
-
SSDEEP
6144:jASq+03d8KhKtL5vbXLMxqHe/rDLrDqfSfR2yh4A9xjZjk+cIi:jASq+0K/VbXLz+/HfDuSfRRrZ5i
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3148 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 1788 rundll32.exe Token: SeDebugPrivilege 620 winlogon.exe Token: SeShutdownPrivilege 332 dwm.exe Token: SeCreatePagefilePrivilege 332 dwm.exe Token: SeShutdownPrivilege 3148 Explorer.EXE Token: SeCreatePagefilePrivilege 3148 Explorer.EXE Token: SeShutdownPrivilege 332 dwm.exe Token: SeCreatePagefilePrivilege 332 dwm.exe Token: SeShutdownPrivilege 3756 RuntimeBroker.exe Token: SeShutdownPrivilege 3756 RuntimeBroker.exe Token: SeShutdownPrivilege 3756 RuntimeBroker.exe Token: SeShutdownPrivilege 332 dwm.exe Token: SeCreatePagefilePrivilege 332 dwm.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3148 Explorer.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2424 wrote to memory of 1788 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 83 PID 2424 wrote to memory of 1788 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 83 PID 2424 wrote to memory of 1788 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 83 PID 2424 wrote to memory of 1788 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 83 PID 2424 wrote to memory of 1788 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 83 PID 2424 wrote to memory of 1788 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 83 PID 2424 wrote to memory of 1788 2424 64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe 83 PID 1788 wrote to memory of 620 1788 rundll32.exe 3 PID 1788 wrote to memory of 332 1788 rundll32.exe 15 PID 620 wrote to memory of 2344 620 winlogon.exe 40 PID 1788 wrote to memory of 2344 1788 rundll32.exe 40 PID 620 wrote to memory of 2360 620 winlogon.exe 41 PID 1788 wrote to memory of 2360 1788 rundll32.exe 41 PID 620 wrote to memory of 2472 620 winlogon.exe 64 PID 620 wrote to memory of 3148 620 winlogon.exe 46 PID 620 wrote to memory of 3328 620 winlogon.exe 57 PID 620 wrote to memory of 3548 620 winlogon.exe 55 PID 620 wrote to memory of 3756 620 winlogon.exe 53 PID 620 wrote to memory of 4004 620 winlogon.exe 47 PID 620 wrote to memory of 4696 620 winlogon.exe 48 PID 620 wrote to memory of 4392 620 winlogon.exe 81
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:332
-
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2344
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2360
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\64ff33cf9a3d079c63c0b0b4d42391d0exe_JC.exe"2⤵
- Checks BIOS information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\system32\rundll32.exe-x iqh.dll3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1788
-
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4004
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4696
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3756
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3548
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3328
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2472
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD55837e97696b40760976bc4d19ce1109e
SHA146b7683ad02d2f5ff64d7cd8331fa5d28acb0238
SHA256a1f8aed453bb64da1c79163bf804d4f37f56a33e7cec4a3b5546c5128732eec4
SHA512097d2070e68236c5c24ca5d92194eb51920f8a0e2f236a7e364e97ca7154ee5602156503248eb62151eb8c78dd6eb86edce1ee725a091e8a371fc3a3640d22f4