Analysis

  • max time kernel
    134s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-05-2024 03:47

General

  • Target

    Juice Client.exe

  • Size

    117.8MB

  • MD5

    85a51cbd17187114fd8e7a3e0d05275b

  • SHA1

    673fcf134fa6090c3adac3102bced9e39427eb38

  • SHA256

    8ca9f1534421959af5079cb082cca465a384677e5cbef8704a5cb76061a368fe

  • SHA512

    226aa68851f065dc3d87fe60728d88fdcfa6c2a7ee44ab0016e4355c77c786dd6c2cdab90939b75e42752214aa4a92a80d2367e3f3017767b7582c3e76d48675

  • SSDEEP

    1572864:c3phys56iO9XvZTFBRWSE/LM7osHX6k70ipol:Bs5jOrXHXIia

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies system certificate store 2 TTPs 11 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Juice Client.exe
    "C:\Users\Admin\AppData\Local\Temp\Juice Client.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:400
    • C:\Users\Admin\AppData\Local\Temp\Juice Client.exe
      "C:\Users\Admin\AppData\Local\Temp\Juice Client.exe" --type=gpu-process --field-trial-handle=1544,3149100805334581194,8189468058832630848,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --gpu-preferences=MAAAAAAAAADgAABwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1556 /prefetch:2
      2⤵
        PID:2628
      • C:\Users\Admin\AppData\Local\Temp\Juice Client.exe
        "C:\Users\Admin\AppData\Local\Temp\Juice Client.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1544,3149100805334581194,8189468058832630848,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --service-sandbox-type=network --standard-schemes --secure-schemes=juiceclient --bypasscsp-schemes --cors-schemes=juiceclient --fetch-schemes --service-worker-schemes --mojo-platform-channel-handle=2140 /prefetch:8
        2⤵
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        PID:4484
      • C:\Users\Admin\AppData\Local\Temp\Juice Client.exe
        "C:\Users\Admin\AppData\Local\Temp\Juice Client.exe" --type=renderer --field-trial-handle=1544,3149100805334581194,8189468058832630848,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --standard-schemes --secure-schemes=juiceclient --bypasscsp-schemes --cors-schemes=juiceclient --fetch-schemes --service-worker-schemes --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --node-integration --no-sandbox --no-zygote --preload="C:\Users\Admin\AppData\Local\Temp\resources\app.asar\src\preload.js" --background-color=#fff --enable-spellcheck --enable-websql --disable-electron-site-instance-overrides --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=3 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2388 /prefetch:1
        2⤵
        • Checks computer location settings
        • Suspicious behavior: EnumeratesProcesses
        PID:1848
      • C:\Users\Admin\AppData\Local\Temp\Juice Client.exe
        "C:\Users\Admin\AppData\Local\Temp\Juice Client.exe" --type=gpu-process --field-trial-handle=1544,3149100805334581194,8189468058832630848,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=MAAAAAAAAADoAABwAAAAAAAAAAAAAAAAAABgAAAIAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=2752 /prefetch:2
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1352
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3804,i,1809100026287847100,9768898026582633513,262144 --variations-seed-version --mojo-platform-channel-handle=3964 /prefetch:8
      1⤵
        PID:4852
      • C:\Windows\System32\CompPkgSrv.exe
        C:\Windows\System32\CompPkgSrv.exe -Embedding
        1⤵
          PID:4888

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\juice-client\12ca04e2-8899-4143-86a5-e778a1b6fd45.tmp

          Filesize

          57B

          MD5

          58127c59cb9e1da127904c341d15372b

          SHA1

          62445484661d8036ce9788baeaba31d204e9a5fc

          SHA256

          be4b8924ab38e8acf350e6e3b9f1f63a1a94952d8002759acd6946c4d5d0b5de

          SHA512

          8d1815b277a93ad590ff79b6f52c576cf920c38c4353c24193f707d66884c942f39ff3989530055d2fade540ade243b41b6eb03cd0cc361c3b5d514cca28b50a

        • C:\Users\Admin\AppData\Roaming\juice-client\Cache\f_000001

          Filesize

          441KB

          MD5

          a78ad14e77147e7de3647e61964c0335

          SHA1

          cecc3dd41f4cea0192b24300c71e1911bd4fce45

          SHA256

          0d6803758ff8f87081fafd62e90f0950dfb2dd7991e9607fe76a8f92d0e893fa

          SHA512

          dde24d5ad50d68fc91e9e325d31e66ef8f624b6bb3a07d14ffed1104d3ab5f4ef1d7969a5cde0dfbb19cb31c506f7de97af67c2f244f7e7e8e10648ea8321101

        • C:\Users\Admin\AppData\Roaming\juice-client\Code Cache\js\index-dir\the-real-index

          Filesize

          48B

          MD5

          4d7c73adb492472ab42db38800f07627

          SHA1

          bae25d3129aaea269dfa9d0d1acf60a45a2191d5

          SHA256

          9f80ff853457de387b74fffd6dfbde4343e1fdb5f687dc4a81d116ab07d87746

          SHA512

          913c7a7ccc9ff03ab0433efc295f1fea4db44d1644cf1c6c772e8eb314614053855ff5674eb4bb99816c735a4d91714fed37e0f8e1bce4c2c5326d32b958048e

        • C:\Users\Admin\AppData\Roaming\juice-client\Code Cache\js\index-dir\the-real-index

          Filesize

          72B

          MD5

          d366a694e93aef40f0b0b256b6879276

          SHA1

          fee2d01a5e179ffec98e40cf82dbe2caee424e9e

          SHA256

          234a8923263109d6901a2308b9b43a0472800c35de44f65d72641177fcc52990

          SHA512

          ebd4980d2b84f9f1206de911ac95b1b160e5ceb10572ae647bcdf3599138cc5127f9e75cde6dd9a0947b5a0662ec4106f6b854cba8f11ccd7b0ee17c16f41d14

        • C:\Users\Admin\AppData\Roaming\juice-client\Network Persistent State

          Filesize

          633B

          MD5

          c0a81c07e00a8e73f7823351078bbfb8

          SHA1

          d74bf879a6035e2200aceb2dd8513e88f5d8b654

          SHA256

          bcf0ddab933ebb2d14520785387eae23ab4858dedd73c787f7e4aec54806e072

          SHA512

          3255852f0a92db8c8e3b9d5f30cd6f335869f6e667d10447a45f9dd6b87d3aeb81398d114a9a442339d300e3b07c0883279c7fa7b7afe9479f2a833eabb15c50

        • C:\Users\Admin\AppData\Roaming\juice-client\Network Persistent State~RFe591880.TMP

          Filesize

          59B

          MD5

          78bfcecb05ed1904edce3b60cb5c7e62

          SHA1

          bf77a7461de9d41d12aa88fba056ba758793d9ce

          SHA256

          c257f929cff0e4380bf08d9f36f310753f7b1ccb5cb2ab811b52760dd8cb9572

          SHA512

          2420dff6eb853f5e1856cdab99561a896ea0743fcff3e04b37cb87eddf063770608a30c6ffb0319e5d353b0132c5f8135b7082488e425666b2c22b753a6a4d73

        • C:\Users\Admin\AppData\Roaming\juice-client\config.json

          Filesize

          600B

          MD5

          cc95ecadf9404599b2e17896ecb7c4db

          SHA1

          fda89fe6df7e95fd7f3d9b849e64ba9241302261

          SHA256

          ca76443d95aabb3f78c3a2aaf0f0bd08694144c5b26eb69b50c9795cb5d17413

          SHA512

          18be946c85780d6218e970441b4d068b6f0e11502254763ccadf882146a3d04ae10747c938cda7e3fbdc176b338b6d4c63a8546b36feafafaadfad28fb950ef1

        • memory/2628-6-0x00007FF969EF0000-0x00007FF969EF1000-memory.dmp

          Filesize

          4KB