Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 02:51
Static task
static1
Behavioral task
behavioral1
Sample
430f9f9361cb04db55d14de9cdc19cd0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
430f9f9361cb04db55d14de9cdc19cd0N.exe
Resource
win10v2004-20240730-en
General
-
Target
430f9f9361cb04db55d14de9cdc19cd0N.exe
-
Size
648KB
-
MD5
430f9f9361cb04db55d14de9cdc19cd0
-
SHA1
2b992bfb8c6638067f08868588445198c9dccdfd
-
SHA256
ed8c50a22892588310327a8e2ce6f1e20e22626677f912acd25a57dedf1e0015
-
SHA512
281d8f74b8b64f103787bc609cecd8e8c347ba24077197c012a148919025d5f98b1fe98500a419470d3031e0fec4884499bee8f0eac675d3a09893c8663acc22
-
SSDEEP
12288:V1b8l0HApIkopKv35U1BlCblRXpv+UhUNyn2KWtqxsgx9w1bfuVM8y3KmodAc375:V1b8eHAuY35U1Op9HZ2M+gkjgNyKmodX
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe sIRC4.exe" 430f9f9361cb04db55d14de9cdc19cd0N.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\sIRC4.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\OfficeC2RClient.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File created C:\Windows\SysWOW64\DC++ Share\mip.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\setup.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCXEC37.tmp 430f9f9361cb04db55d14de9cdc19cd0N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\javac.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File created C:\Windows\SysWOW64\DC++ Share\javafxpackager.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File created C:\Windows\SysWOW64\xdccPrograms\7zFM.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File created C:\Windows\SysWOW64\xdccPrograms\InspectorOfficeGadget.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File created C:\Windows\SysWOW64\DC++ Share\createdump.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File created C:\Windows\SysWOW64\DC++ Share\iexplore.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File created C:\Windows\SysWOW64\DC++ Share\idlj.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\jarsigner.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File created C:\Windows\SysWOW64\xdccPrograms\7z.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File created C:\Windows\SysWOW64\DC++ Share\dotnet.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File created C:\Windows\SysWOW64\DC++ Share\appletviewer.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File created C:\Windows\SysWOW64\xdccPrograms\IntegratedOffice.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File created C:\Windows\SysWOW64\DC++ Share\setup.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\extcheck.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\java.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File created C:\Windows\SysWOW64\DC++ Share\LICLUA.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File created C:\Windows\SysWOW64\DC++ Share\OSE.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File created C:\Windows\SysWOW64\DC++ Share\ielowutil.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCXEBF6.tmp 430f9f9361cb04db55d14de9cdc19cd0N.exe File created C:\Windows\SysWOW64\DC++ Share\java-rmi.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\7z.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\7zG.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\appvcleaner.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\createdump.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\elevation_service.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File created C:\Windows\SysWOW64\DC++ Share\ieinstal.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File created C:\Windows\SysWOW64\xdccPrograms\AppVShNotify.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File created C:\Windows\SysWOW64\DC++ Share\ShapeCollector.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\chrmstp.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File created C:\Windows\SysWOW64\DC++ Share\chrome.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File created C:\Windows\SysWOW64\DC++ Share\extcheck.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\idlj.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File created C:\Windows\SysWOW64\xdccPrograms\7zG.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File created C:\Windows\SysWOW64\DC++ Share\msinfo32.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\LICLUA.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\dotnet.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\OSE.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File created C:\Windows\SysWOW64\DC++ Share\chrmstp.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\java-rmi.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\appletviewer.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File created C:\Windows\SysWOW64\DC++ Share\jar.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File created C:\Windows\SysWOW64\xdccPrograms\appvcleaner.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File created C:\Windows\SysWOW64\DC++ Share\OfficeClickToRun.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File created C:\Windows\SysWOW64\DC++ Share\VSTOInstaller.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File created C:\Windows\SysWOW64\DC++ Share\chrome_pwa_launcher.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File created C:\Windows\SysWOW64\DC++ Share\elevation_service.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File created C:\Windows\SysWOW64\DC++ Share\chrome_proxy.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File created C:\Windows\SysWOW64\DC++ Share\javadoc.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\javafxpackager.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File created C:\Windows\SysWOW64\xdccPrograms\Uninstall.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File created C:\Windows\SysWOW64\DC++ Share\TabTip.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\TabTip.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File created C:\Windows\SysWOW64\DC++ Share\ExtExport.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\jabswitch.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File created C:\Windows\SysWOW64\xdccPrograms\MavInject32.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\ielowutil.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File created C:\Windows\SysWOW64\DC++ Share\java.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\RCXEC57.tmp 430f9f9361cb04db55d14de9cdc19cd0N.exe File created C:\Windows\SysWOW64\DC++ Share\OfficeC2RClient.exe 430f9f9361cb04db55d14de9cdc19cd0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 430f9f9361cb04db55d14de9cdc19cd0N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD557ba4103e5d4a0ef3d23ab20cb1a1d80
SHA13522d98098050dc901d94727465cc6bac366e1f4
SHA256a355d9a8aee087169571326db7e14668e17fe2739261b2fab56c778e34ac4d95
SHA51243d10b3915351d1bee259874b4ac8c5c33c8fb378bd4d3d24efef6d6012ef9e3af0af3440418ad55f14689fb3ebc93a58c27c84c0bdcac7df0649f30b9605267
-
Filesize
930KB
MD57de6f110ed1ef083b3a2ffabd57512be
SHA1237af32de7496e3f1599da8e7cd7ef47b0f7b8fa
SHA25642e70b24b7ecfc4f43b34e6b8de2234c4e3ce4070b5f26515f9d3aae49b85cb7
SHA512828d4b4127ee37d9e116926d5cc10164e50c89af4e0dad877cb8d34397890f5db69d6e9e0af942f40f2b182aab56ffb42998586debaa2c0c050198fe3322a25d