General
-
Target
JapanWare.exe
-
Size
8.3MB
-
Sample
241201-jfhchsymcx
-
MD5
f24a1c5064edb7e29b1f147cf2954afa
-
SHA1
93c6a7eb05781eb7ffef9d4094847bc3876d81fc
-
SHA256
0cd3ebd25cd67e8e62b887563b0fca437080843d797d24513694e6cb712d37f0
-
SHA512
c5e95eb27fc4ef6e3b8a7a20bbbe15e35678095404239b3d574a22526e2586d68ace36e2f8b7377685a0ca8a46b91c2565de1e69e49295c013d1a01ee9db8005
-
SSDEEP
196608:QkuYTrwfI9jUCzi4H1qSiXLGVi7DMgpZASEyQ0VMwICEc/j:CIHziK1piXLGVE4UrS0VJ
Behavioral task
behavioral1
Sample
JapanWare.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JapanWare.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JapanWare.exe
-
Size
8.3MB
-
MD5
f24a1c5064edb7e29b1f147cf2954afa
-
SHA1
93c6a7eb05781eb7ffef9d4094847bc3876d81fc
-
SHA256
0cd3ebd25cd67e8e62b887563b0fca437080843d797d24513694e6cb712d37f0
-
SHA512
c5e95eb27fc4ef6e3b8a7a20bbbe15e35678095404239b3d574a22526e2586d68ace36e2f8b7377685a0ca8a46b91c2565de1e69e49295c013d1a01ee9db8005
-
SSDEEP
196608:QkuYTrwfI9jUCzi4H1qSiXLGVi7DMgpZASEyQ0VMwICEc/j:CIHziK1piXLGVE4UrS0VJ
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Obfuscated Files or Information
1Command Obfuscation
1