Analysis
-
max time kernel
136s -
max time network
173s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
13-05-2021 12:58
Static task
static1
Behavioral task
behavioral1
Sample
76975b18a5657bafee53b5b0d30e70ab4a43ef59a181e1d20666772208644bdc.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
76975b18a5657bafee53b5b0d30e70ab4a43ef59a181e1d20666772208644bdc.exe
Resource
win10v20210408
General
-
Target
76975b18a5657bafee53b5b0d30e70ab4a43ef59a181e1d20666772208644bdc.exe
-
Size
58KB
-
MD5
b8773f418146adfc92a6917c55bef254
-
SHA1
d2f8bd0c221b1cbebde25f4957ed5eea99bb7ec5
-
SHA256
76975b18a5657bafee53b5b0d30e70ab4a43ef59a181e1d20666772208644bdc
-
SHA512
9e66f7ff300c04541fdff72d5db7f11b3acb2a56badc6914b370f3cdee3ab7e19a447196e8277149ce2bf313744c2b04656ed2f8db2529a876d657b26d30f184
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
jusched.exepid process 1668 jusched.exe -
Loads dropped DLL 2 IoCs
Processes:
76975b18a5657bafee53b5b0d30e70ab4a43ef59a181e1d20666772208644bdc.exepid process 1392 76975b18a5657bafee53b5b0d30e70ab4a43ef59a181e1d20666772208644bdc.exe 1392 76975b18a5657bafee53b5b0d30e70ab4a43ef59a181e1d20666772208644bdc.exe -
Drops file in Program Files directory 2 IoCs
Processes:
76975b18a5657bafee53b5b0d30e70ab4a43ef59a181e1d20666772208644bdc.exedescription ioc process File created C:\Program Files (x86)\375cb7b4\jusched.exe 76975b18a5657bafee53b5b0d30e70ab4a43ef59a181e1d20666772208644bdc.exe File created C:\Program Files (x86)\375cb7b4\375cb7b4 76975b18a5657bafee53b5b0d30e70ab4a43ef59a181e1d20666772208644bdc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
jusched.exepid process 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe 1668 jusched.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
76975b18a5657bafee53b5b0d30e70ab4a43ef59a181e1d20666772208644bdc.exedescription pid process target process PID 1392 wrote to memory of 1668 1392 76975b18a5657bafee53b5b0d30e70ab4a43ef59a181e1d20666772208644bdc.exe jusched.exe PID 1392 wrote to memory of 1668 1392 76975b18a5657bafee53b5b0d30e70ab4a43ef59a181e1d20666772208644bdc.exe jusched.exe PID 1392 wrote to memory of 1668 1392 76975b18a5657bafee53b5b0d30e70ab4a43ef59a181e1d20666772208644bdc.exe jusched.exe PID 1392 wrote to memory of 1668 1392 76975b18a5657bafee53b5b0d30e70ab4a43ef59a181e1d20666772208644bdc.exe jusched.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\76975b18a5657bafee53b5b0d30e70ab4a43ef59a181e1d20666772208644bdc.exe"C:\Users\Admin\AppData\Local\Temp\76975b18a5657bafee53b5b0d30e70ab4a43ef59a181e1d20666772208644bdc.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Program Files (x86)\375cb7b4\jusched.exe"C:\Program Files (x86)\375cb7b4\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1668
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
f253efe302d32ab264a76e0ce65be769
SHA1768685ca582abd0af2fbb57ca37752aa98c9372b
SHA25649dca65f362fee401292ed7ada96f96295eab1e589c52e4e66bf4aedda715fdd
SHA5121990d20b462406bbadb22ba43f1ed9d0db6b250881d4ac89ad8cf6e43ca92b2fd31c3a15be1e6e149e42fdb46e58122c15bc7869a82c9490656c80df69fa77c4
-
MD5
6426bcd17d71237888825d17d8a3f812
SHA152ef35d216384c2ec6aabb7650cab904dc441953
SHA256e14395899cb32a9bbd2cd32b3769ad3021550c343bd87e49989762fb0a8d0e1c
SHA5128ff5e9c823a530e1c75f27e75910c1bf75c490696e18155ee6f59fe7bc5e2f492e71d86b0338074f1292b45f45a962b1d4e1ccbb0b30916b1c55265a6542a6e6
-
MD5
6426bcd17d71237888825d17d8a3f812
SHA152ef35d216384c2ec6aabb7650cab904dc441953
SHA256e14395899cb32a9bbd2cd32b3769ad3021550c343bd87e49989762fb0a8d0e1c
SHA5128ff5e9c823a530e1c75f27e75910c1bf75c490696e18155ee6f59fe7bc5e2f492e71d86b0338074f1292b45f45a962b1d4e1ccbb0b30916b1c55265a6542a6e6
-
MD5
6426bcd17d71237888825d17d8a3f812
SHA152ef35d216384c2ec6aabb7650cab904dc441953
SHA256e14395899cb32a9bbd2cd32b3769ad3021550c343bd87e49989762fb0a8d0e1c
SHA5128ff5e9c823a530e1c75f27e75910c1bf75c490696e18155ee6f59fe7bc5e2f492e71d86b0338074f1292b45f45a962b1d4e1ccbb0b30916b1c55265a6542a6e6