Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2024 23:56
Static task
static1
Behavioral task
behavioral1
Sample
8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe
Resource
win10v2004-20240709-en
General
-
Target
8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe
-
Size
3.4MB
-
MD5
796ddfcacf1b60509ba851ad6a06f52e
-
SHA1
c85b456b732dd4aec1840b47911280245f70bb0e
-
SHA256
8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae
-
SHA512
ade8f015f95a97201cb09df1c2deec44167afc70986911d7f616eac14729b12f7a109f47c70ec208bbbc7992aaf757822efb1af2f7c285b812da1d14b28f687b
-
SSDEEP
98304:4Y3clhWcS2oXsgXc6X/D/IIhhXqeIDCi39r4O/ix3g+IE6O:8WcNoXua/DjXqjDT90iOoE6O
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe sIRC4.exe" 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\DC++ Share\jar.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCXB1BE.tmp 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File created C:\Windows\SysWOW64\DC++ Share\java.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File opened for modification C:\Windows\SysWOW64\sIRC4.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\7zG.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File created C:\Windows\SysWOW64\DC++ Share\OfficeClickToRun.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File created C:\Windows\SysWOW64\DC++ Share\ShapeCollector.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File created C:\Windows\SysWOW64\DC++ Share\jabswitch.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\OSE.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File created C:\Windows\SysWOW64\DC++ Share\setup.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File created C:\Windows\SysWOW64\DC++ Share\ieinstal.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File created C:\Windows\SysWOW64\DC++ Share\javac.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\javadoc.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\InspectorOfficeGadget.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\ExtExport.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCXB17D.tmp 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File created C:\Windows\SysWOW64\DC++ Share\extcheck.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\idlj.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\MavInject32.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File created C:\Windows\SysWOW64\DC++ Share\createdump.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\elevation_service.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\javafxpackager.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File created C:\Windows\SysWOW64\DC++ Share\TabTip.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File created C:\Windows\SysWOW64\DC++ Share\chrome_pwa_launcher.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File created C:\Windows\SysWOW64\DC++ Share\jarsigner.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File created C:\Windows\SysWOW64\DC++ Share\mip.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File created C:\Windows\SysWOW64\DC++ Share\OSE.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File created C:\Windows\SysWOW64\DC++ Share\ielowutil.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\jabswitch.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\javac.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File created C:\Windows\SysWOW64\xdccPrograms\7zG.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File created C:\Windows\SysWOW64\xdccPrograms\AppVShNotify.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File created C:\Windows\SysWOW64\DC++ Share\VSTOInstaller.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File created C:\Windows\SysWOW64\DC++ Share\chrome_proxy.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File created C:\Windows\SysWOW64\DC++ Share\ExtExport.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File created C:\Windows\SysWOW64\xdccPrograms\7z.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File created C:\Windows\SysWOW64\xdccPrograms\Uninstall.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\IntegratedOffice.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\appletviewer.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\jarsigner.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File created C:\Windows\SysWOW64\DC++ Share\elevation_service.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File created C:\Windows\SysWOW64\DC++ Share\iexplore.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File created C:\Windows\SysWOW64\DC++ Share\idlj.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCXB1DE.tmp 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File created C:\Windows\SysWOW64\DC++ Share\javadoc.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\TabTip.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\extcheck.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCXB19E.tmp 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File created C:\Windows\SysWOW64\DC++ Share\java-rmi.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File created C:\Windows\SysWOW64\DC++ Share\chrome.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\java-rmi.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\7z.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\AppVShNotify.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File created C:\Windows\SysWOW64\xdccPrograms\InspectorOfficeGadget.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File created C:\Windows\SysWOW64\xdccPrograms\MavInject32.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File created C:\Windows\SysWOW64\DC++ Share\chrmstp.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File created C:\Windows\SysWOW64\DC++ Share\jar.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File created C:\Windows\SysWOW64\sIRC4.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\InputPersonalization.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File created C:\Windows\SysWOW64\DC++ Share\msinfo32.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File created C:\Windows\SysWOW64\DC++ Share\iediagcmd.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\iediagcmd.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File created C:\Windows\SysWOW64\DC++ Share\LICLUA.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe File created C:\Windows\SysWOW64\DC++ Share\dotnet.exe 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe"C:\Users\Admin\AppData\Local\Temp\8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD579f79b8265359f3260356aadc610eb25
SHA1d43af60dfe8573369c873dc062ffa9149b4e009b
SHA256a0657bf634615fa6021487f80ca36aca350ae089430cf4db427fbb385ba7e939
SHA51206a00de59b3099003871643ada035ddd38d28c91281ec9fe9401a9679e4707612796e558d382bae546847892fd250ff7995581b94f5d2895ca73167c002fcb4d
-
Filesize
3.5MB
MD533f199e99b2efde8f322428c04e77203
SHA1c2de29e2efe21dc00b4979a19476ec838697fd6e
SHA2567c9f2f18366955f179a90a4149bed32e4e84abbf9dcd6fdd2c985782022d4a4a
SHA5128593dca280657284da07d468e9345b985cae1679c3b6ffed6678c42eacb7271437131b59aa64b50948eb74855d448e191b21ec7ea2dbffb42afc67d691cbd202