Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2024 21:18
Behavioral task
behavioral1
Sample
7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe
Resource
win10v2004-20240226-en
General
-
Target
7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe
-
Size
847KB
-
MD5
4945e50c782812a90e8dfd20bded03da
-
SHA1
395df2e42ff9ee87935248241a1b71c8eec0345d
-
SHA256
7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a
-
SHA512
f0a75eba7a1f0c326b211a7a7e03d482a32c6e068f155a11dce49b58a97c727705d7ab3f6a858805523727f939a3338a677710bdb01fde9dba9e28d9216cceec
-
SSDEEP
24576:hi0/GNd0pnDznMVN6OLNMYGdTKeaAL7jqoO7:U0es/nMVI/dTp7s
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe sIRC4.exe" 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe -
UPX dump on OEP (original entry point) 17 IoCs
resource yara_rule behavioral2/memory/2276-0-0x0000000000400000-0x000000000041A000-memory.dmp UPX behavioral2/files/0x0007000000023202-7.dat UPX behavioral2/memory/2276-22-0x0000000000400000-0x000000000041A000-memory.dmp UPX behavioral2/memory/2276-23-0x0000000000400000-0x000000000041A000-memory.dmp UPX behavioral2/memory/2276-24-0x0000000000400000-0x000000000041A000-memory.dmp UPX behavioral2/memory/2276-25-0x0000000000400000-0x000000000041A000-memory.dmp UPX behavioral2/memory/2276-26-0x0000000000400000-0x000000000041A000-memory.dmp UPX behavioral2/memory/2276-27-0x0000000000400000-0x000000000041A000-memory.dmp UPX behavioral2/memory/2276-28-0x0000000000400000-0x000000000041A000-memory.dmp UPX behavioral2/memory/2276-29-0x0000000000400000-0x000000000041A000-memory.dmp UPX behavioral2/memory/2276-30-0x0000000000400000-0x000000000041A000-memory.dmp UPX behavioral2/memory/2276-31-0x0000000000400000-0x000000000041A000-memory.dmp UPX behavioral2/memory/2276-34-0x0000000000400000-0x000000000041A000-memory.dmp UPX behavioral2/memory/2276-35-0x0000000000400000-0x000000000041A000-memory.dmp UPX behavioral2/memory/2276-36-0x0000000000400000-0x000000000041A000-memory.dmp UPX behavioral2/memory/2276-63-0x0000000000400000-0x000000000041A000-memory.dmp UPX behavioral2/memory/2276-104-0x0000000000400000-0x000000000041A000-memory.dmp UPX -
resource yara_rule behavioral2/memory/2276-0-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/files/0x0007000000023202-7.dat upx behavioral2/memory/2276-22-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/2276-23-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/2276-24-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/2276-25-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/2276-26-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/2276-27-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/2276-28-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/2276-29-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/2276-30-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/2276-31-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/2276-34-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/2276-35-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/2276-36-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/2276-63-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/2276-104-0x0000000000400000-0x000000000041A000-memory.dmp upx -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\DC++ Share\ielowutil.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File created C:\Windows\SysWOW64\DC++ Share\idlj.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\jabswitch.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File created C:\Windows\SysWOW64\xdccPrograms\IntegratedOffice.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File created C:\Windows\SysWOW64\DC++ Share\jabswitch.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File created C:\Windows\SysWOW64\DC++ Share\msinfo32.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\chrmstp.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File created C:\Windows\SysWOW64\DC++ Share\chrome_proxy.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\iediagcmd.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File created C:\Windows\SysWOW64\DC++ Share\jar.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File created C:\Windows\SysWOW64\xdccPrograms\7zFM.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\InspectorOfficeGadget.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File created C:\Windows\SysWOW64\DC++ Share\TabTip.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File created C:\Windows\SysWOW64\DC++ Share\OfficeClickToRun.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\master_prefere.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File created C:\Windows\SysWOW64\DC++ Share\appletviewer.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File created C:\Windows\SysWOW64\xdccPrograms\7z.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File created C:\Windows\SysWOW64\DC++ Share\MavInject32.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\MavInject32.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\chrome.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File created C:\Windows\SysWOW64\DC++ Share\extcheck.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\jar.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\ieinstal.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\appletviewer.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\OSE.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File created C:\Windows\SysWOW64\DC++ Share\dotnet.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File created C:\Windows\SysWOW64\DC++ Share\setup.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File created C:\Windows\SysWOW64\xdccPrograms\office2016setup.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\appvcleaner.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File created C:\Windows\SysWOW64\xdccPrograms\InspectorOfficeGadget.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\java-rmi.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCX747A.tmp 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\7z.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File created C:\Windows\SysWOW64\xdccPrograms\AppVShNotify.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\VSTOInstaller.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\LICLUA.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File created C:\Windows\SysWOW64\DC++ Share\VSTOInstaller.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File created C:\Windows\SysWOW64\DC++ Share\notification_helper.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\extcheck.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File created C:\Windows\SysWOW64\xdccPrograms\Uninstall.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File created C:\Windows\SysWOW64\DC++ Share\OfficeC2RClient.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\OfficeC2RClient.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File created C:\Windows\SysWOW64\DC++ Share\iediagcmd.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File created C:\Windows\SysWOW64\DC++ Share\ieinstal.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File created C:\Windows\SysWOW64\DC++ Share\iexplore.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File created C:\Windows\SysWOW64\DC++ Share\jarsigner.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File created C:\Windows\SysWOW64\DC++ Share\InputPersonalization.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\msinfo32.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File created C:\Windows\SysWOW64\DC++ Share\elevation_service.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File created C:\Windows\SysWOW64\DC++ Share\ShapeCollector.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File created C:\Windows\SysWOW64\DC++ Share\OSE.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\idlj.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File created C:\Windows\SysWOW64\DC++ Share\java.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File created C:\Windows\SysWOW64\DC++ Share\javac.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\createdump.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\ExtExport.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File created C:\Windows\SysWOW64\DC++ Share\java-rmi.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File created C:\Windows\SysWOW64\DC++ Share\chrome.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File opened for modification C:\Windows\SysWOW64\sIRC4.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File created C:\Windows\SysWOW64\xdccPrograms\appvcleaner.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File created C:\Windows\SysWOW64\DC++ Share\mip.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\java.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\7zFM.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\AppVShNotify.exe 7355d97e64944942e756f007bbed6dfbb0d4034b1d02f2effda9d1b55c11028a.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
930KB
MD5c8d24a3c5c9d5d4504b0b90d1e50ecc2
SHA10acb17fa96f0ac14c428ed4bac5146f3aebd78f5
SHA256590f356ce373caf8475a2e07ed2a2c56ad9c697113be5f0fbab161a0df1f7b50
SHA512c6eb6dbfbc2bb777851b13d16b066959bca252571bd85543552f22e5073a6b2c50645eec9374183931f34bc5585952ee15d4a50eb4ebd87008bd7ae8c72180be