Analysis
-
max time kernel
136s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-04-2024 19:26
Static task
static1
Behavioral task
behavioral1
Sample
3e0f59cb649699c6004139763a123b5c.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3e0f59cb649699c6004139763a123b5c.exe
Resource
win10v2004-20240226-en
General
-
Target
3e0f59cb649699c6004139763a123b5c.exe
-
Size
5.9MB
-
MD5
3e0f59cb649699c6004139763a123b5c
-
SHA1
33d1b61ec90d7e747ab03cc3563358bcbf73d1cc
-
SHA256
af1e9014d4c93ccaf1951775e742a2f3ab22aa8c670dc2dab42c4a576e360b55
-
SHA512
7780b561ecbc4b7d3fbddc677866052a1331c7b9dd451349ef431aacff4873e02bfb722323af3a433a403108f743fb3f68f85427ea65b1471e463823fc7db43e
-
SSDEEP
98304:dG6q0HqBQgN71haEmfJ7vl003/VfBtaiq2KveJddj8J7Em9S7MxWBvEe0aRKCeAl:A6q0HkQgN1DmfJLO03/Vnaiq2L8dET6S
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe sIRC4.exe" 3e0f59cb649699c6004139763a123b5c.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\xdccPrograms\AppVShNotify.exe 3e0f59cb649699c6004139763a123b5c.exe File created C:\Windows\SysWOW64\DC++ Share\OfficeC2RClient.exe 3e0f59cb649699c6004139763a123b5c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\OfficeClickToRun.exe 3e0f59cb649699c6004139763a123b5c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\ieinstal.exe 3e0f59cb649699c6004139763a123b5c.exe File created C:\Windows\SysWOW64\DC++ Share\idlj.exe 3e0f59cb649699c6004139763a123b5c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\idlj.exe 3e0f59cb649699c6004139763a123b5c.exe File opened for modification C:\Windows\SysWOW64\sIRC4.exe 3e0f59cb649699c6004139763a123b5c.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\7z.exe 3e0f59cb649699c6004139763a123b5c.exe File created C:\Windows\SysWOW64\DC++ Share\msinfo32.exe 3e0f59cb649699c6004139763a123b5c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCX58EE.tmp 3e0f59cb649699c6004139763a123b5c.exe File created C:\Windows\SysWOW64\xdccPrograms\7zFM.exe 3e0f59cb649699c6004139763a123b5c.exe File created C:\Windows\SysWOW64\DC++ Share\VSTOInstaller.exe 3e0f59cb649699c6004139763a123b5c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\chrome.exe 3e0f59cb649699c6004139763a123b5c.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\7zG.exe 3e0f59cb649699c6004139763a123b5c.exe File created C:\Windows\SysWOW64\DC++ Share\MavInject32.exe 3e0f59cb649699c6004139763a123b5c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\ShapeCollector.exe 3e0f59cb649699c6004139763a123b5c.exe File created C:\Windows\SysWOW64\DC++ Share\ieinstal.exe 3e0f59cb649699c6004139763a123b5c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\appletviewer.exe 3e0f59cb649699c6004139763a123b5c.exe File created C:\Windows\SysWOW64\xdccPrograms\appvcleaner.exe 3e0f59cb649699c6004139763a123b5c.exe File created C:\Windows\SysWOW64\DC++ Share\OSE.exe 3e0f59cb649699c6004139763a123b5c.exe File created C:\Windows\SysWOW64\DC++ Share\dotnet.exe 3e0f59cb649699c6004139763a123b5c.exe File created C:\Windows\SysWOW64\DC++ Share\chrome.exe 3e0f59cb649699c6004139763a123b5c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\chrome_proxy.exe 3e0f59cb649699c6004139763a123b5c.exe File created C:\Windows\SysWOW64\DC++ Share\master_prefere.exe 3e0f59cb649699c6004139763a123b5c.exe File created C:\Windows\SysWOW64\DC++ Share\ielowutil.exe 3e0f59cb649699c6004139763a123b5c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\InputPersonalization.exe 3e0f59cb649699c6004139763a123b5c.exe File created C:\Windows\SysWOW64\DC++ Share\createdump.exe 3e0f59cb649699c6004139763a123b5c.exe File created C:\Windows\SysWOW64\DC++ Share\chrome_proxy.exe 3e0f59cb649699c6004139763a123b5c.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\appvcleaner.exe 3e0f59cb649699c6004139763a123b5c.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\InspectorOfficeGadget.exe 3e0f59cb649699c6004139763a123b5c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\TabTip.exe 3e0f59cb649699c6004139763a123b5c.exe File created C:\Windows\SysWOW64\DC++ Share\LICLUA.exe 3e0f59cb649699c6004139763a123b5c.exe File created C:\Windows\SysWOW64\DC++ Share\chrome_pwa_launcher.exe 3e0f59cb649699c6004139763a123b5c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\iexplore.exe 3e0f59cb649699c6004139763a123b5c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\java-rmi.exe 3e0f59cb649699c6004139763a123b5c.exe File created C:\Windows\SysWOW64\xdccPrograms\Uninstall.exe 3e0f59cb649699c6004139763a123b5c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\msinfo32.exe 3e0f59cb649699c6004139763a123b5c.exe File created C:\Windows\SysWOW64\DC++ Share\elevation_service.exe 3e0f59cb649699c6004139763a123b5c.exe File created C:\Windows\SysWOW64\DC++ Share\iexplore.exe 3e0f59cb649699c6004139763a123b5c.exe File created C:\Windows\SysWOW64\DC++ Share\jarsigner.exe 3e0f59cb649699c6004139763a123b5c.exe File created C:\Windows\SysWOW64\xdccPrograms\office2016setup.exe 3e0f59cb649699c6004139763a123b5c.exe File created C:\Windows\SysWOW64\xdccPrograms\IntegratedOffice.exe 3e0f59cb649699c6004139763a123b5c.exe File created C:\Windows\SysWOW64\DC++ Share\mip.exe 3e0f59cb649699c6004139763a123b5c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\OSE.exe 3e0f59cb649699c6004139763a123b5c.exe File created C:\Windows\SysWOW64\DC++ Share\setup.exe 3e0f59cb649699c6004139763a123b5c.exe File created C:\Windows\SysWOW64\DC++ Share\ExtExport.exe 3e0f59cb649699c6004139763a123b5c.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\IntegratedOffice.exe 3e0f59cb649699c6004139763a123b5c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\createdump.exe 3e0f59cb649699c6004139763a123b5c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\chrmstp.exe 3e0f59cb649699c6004139763a123b5c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\extcheck.exe 3e0f59cb649699c6004139763a123b5c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCX58BF.tmp 3e0f59cb649699c6004139763a123b5c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\dotnet.exe 3e0f59cb649699c6004139763a123b5c.exe File created C:\Windows\SysWOW64\DC++ Share\iediagcmd.exe 3e0f59cb649699c6004139763a123b5c.exe File created C:\Windows\SysWOW64\DC++ Share\extcheck.exe 3e0f59cb649699c6004139763a123b5c.exe File created C:\Windows\SysWOW64\DC++ Share\jar.exe 3e0f59cb649699c6004139763a123b5c.exe File created C:\Windows\SysWOW64\xdccPrograms\7zG.exe 3e0f59cb649699c6004139763a123b5c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\OfficeC2RClient.exe 3e0f59cb649699c6004139763a123b5c.exe File created C:\Windows\SysWOW64\DC++ Share\TabTip.exe 3e0f59cb649699c6004139763a123b5c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\GetInvoke.exe 3e0f59cb649699c6004139763a123b5c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\notification_helper.exe 3e0f59cb649699c6004139763a123b5c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\master_prefere.exe 3e0f59cb649699c6004139763a123b5c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\jabswitch.exe 3e0f59cb649699c6004139763a123b5c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\jarsigner.exe 3e0f59cb649699c6004139763a123b5c.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\java.exe 3e0f59cb649699c6004139763a123b5c.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1240 3e0f59cb649699c6004139763a123b5c.exe 1240 3e0f59cb649699c6004139763a123b5c.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.9MB
MD54d98dcee1bfaee6b1e48efad371af4b8
SHA1dfaf735d8c50c621ef974f9b3f27d85ed24c649d
SHA256e9fbec5209aa746c6e2a8044172133668eaad214371617ab0dcbc3787b4892b8
SHA51219c4fdab3737e58a8a778ca5514db7e85cc1c15080644707b9e345ea5a4f2ed43891fc994b059adb2ea74e4737e5c25cc2285a6392fd2ecf355197712f312897
-
Filesize
5.9MB
MD53e0f59cb649699c6004139763a123b5c
SHA133d1b61ec90d7e747ab03cc3563358bcbf73d1cc
SHA256af1e9014d4c93ccaf1951775e742a2f3ab22aa8c670dc2dab42c4a576e360b55
SHA5127780b561ecbc4b7d3fbddc677866052a1331c7b9dd451349ef431aacff4873e02bfb722323af3a433a403108f743fb3f68f85427ea65b1471e463823fc7db43e