Analysis
-
max time kernel
157s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14-10-2023 03:48
Static task
static1
Behavioral task
behavioral1
Sample
d3bcf7eff2e952687f69c5948802e351_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d3bcf7eff2e952687f69c5948802e351_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
d3bcf7eff2e952687f69c5948802e351_JC.exe
-
Size
337KB
-
MD5
d3bcf7eff2e952687f69c5948802e351
-
SHA1
6f42258106c77e13404501dfca313117bb1500c4
-
SHA256
dd26a797e49d67a61d59ea2bbe98d46bd7e059006dcab98c885eaddd2f49bee1
-
SHA512
c5d18fa2b38c31d19a7568138a44cfb4d8eb3a1005c56c3e018f00ee07fe837a776ccecdae1a1faba7b9588731b65fc4c4f88fd0630677446485a428034ee876
-
SSDEEP
6144:s7ASJKenie2xT2NU2OTFQb8Fb0I1UfFmPGL:sl5nilTFQbI0a+GGL
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelPowerAgent9 = "rundll32.exe shell32.dll, ShellExec_RunDLL C:\\PROGRA~3\\DJ2F6F~1.EXE" svchost.exe -
Checks for any installed AV software in registry 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Software\Wow6432Node\Avira svchost.exe Key opened \REGISTRY\MACHINE\Software\Wow6432Node\AVAST Software\Avast svchost.exe Key opened \REGISTRY\MACHINE\Software\Wow6432Node\Eset\Nod svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2456 set thread context of 2052 2456 d3bcf7eff2e952687f69c5948802e351_JC.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe 2052 svchost.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2456 wrote to memory of 2052 2456 d3bcf7eff2e952687f69c5948802e351_JC.exe 28 PID 2456 wrote to memory of 2052 2456 d3bcf7eff2e952687f69c5948802e351_JC.exe 28 PID 2456 wrote to memory of 2052 2456 d3bcf7eff2e952687f69c5948802e351_JC.exe 28 PID 2456 wrote to memory of 2052 2456 d3bcf7eff2e952687f69c5948802e351_JC.exe 28 PID 2456 wrote to memory of 2052 2456 d3bcf7eff2e952687f69c5948802e351_JC.exe 28 PID 2456 wrote to memory of 2052 2456 d3bcf7eff2e952687f69c5948802e351_JC.exe 28 PID 2456 wrote to memory of 2052 2456 d3bcf7eff2e952687f69c5948802e351_JC.exe 28 PID 2456 wrote to memory of 2052 2456 d3bcf7eff2e952687f69c5948802e351_JC.exe 28 PID 2456 wrote to memory of 2052 2456 d3bcf7eff2e952687f69c5948802e351_JC.exe 28 PID 2456 wrote to memory of 2052 2456 d3bcf7eff2e952687f69c5948802e351_JC.exe 28 PID 2456 wrote to memory of 2052 2456 d3bcf7eff2e952687f69c5948802e351_JC.exe 28 PID 2456 wrote to memory of 2052 2456 d3bcf7eff2e952687f69c5948802e351_JC.exe 28 PID 2456 wrote to memory of 2884 2456 d3bcf7eff2e952687f69c5948802e351_JC.exe 29 PID 2456 wrote to memory of 2884 2456 d3bcf7eff2e952687f69c5948802e351_JC.exe 29 PID 2456 wrote to memory of 2884 2456 d3bcf7eff2e952687f69c5948802e351_JC.exe 29 PID 2456 wrote to memory of 2884 2456 d3bcf7eff2e952687f69c5948802e351_JC.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3bcf7eff2e952687f69c5948802e351_JC.exe"C:\Users\Admin\AppData\Local\Temp\d3bcf7eff2e952687f69c5948802e351_JC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\svchost.exeC:\ProgramData\dj2f6f824d.exe2⤵
- Adds Run key to start application
- Checks for any installed AV software in registry
- Suspicious behavior: EnumeratesProcesses
PID:2052
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\fxn334.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\d3bcf7eff2e952687f69c5948802e351_JC.exe""2⤵PID:2884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35B
MD597b29d96245a344bc5b3e6862345f4f9
SHA19609d271aaae01df4dc7c739eaed374525aae14d
SHA256fdb18db7b7491e10457e0772d6b8fd57fd27a2b60f6e65fc66f210a147f520e1
SHA51267395fdb88008258e0ee00039036897753d9fe0bf05ea925a2c3ff2171db6f94212c6592458463e1d7a2a614cd8445598fcf982a3580ba71f30aca7f76f9aeb1
-
Filesize
35B
MD597b29d96245a344bc5b3e6862345f4f9
SHA19609d271aaae01df4dc7c739eaed374525aae14d
SHA256fdb18db7b7491e10457e0772d6b8fd57fd27a2b60f6e65fc66f210a147f520e1
SHA51267395fdb88008258e0ee00039036897753d9fe0bf05ea925a2c3ff2171db6f94212c6592458463e1d7a2a614cd8445598fcf982a3580ba71f30aca7f76f9aeb1