Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 21:53
Static task
static1
Behavioral task
behavioral1
Sample
fb3b9a369d44176c76794d0b8172b1a0a10fb8b79fa59eb98227fa90eeae07fe.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fb3b9a369d44176c76794d0b8172b1a0a10fb8b79fa59eb98227fa90eeae07fe.exe
Resource
win10v2004-20220812-en
General
-
Target
fb3b9a369d44176c76794d0b8172b1a0a10fb8b79fa59eb98227fa90eeae07fe.exe
-
Size
35KB
-
MD5
0c7fabf8b74ef813abb8f71532e38eaa
-
SHA1
a534f1e5b95b054e36e58f3cda0c46caf3a5b91a
-
SHA256
fb3b9a369d44176c76794d0b8172b1a0a10fb8b79fa59eb98227fa90eeae07fe
-
SHA512
bd81db1a192759e77792f0470fbdc71d69d85a4213753f667cd45b6d6a4f27dea8e7ca78b9e24f54f43e7188632f7aabedece2b184382d51b311b7a901674e4d
-
SSDEEP
768:mzQYScGrIubHuYtvdxwYHw5FAe2Qqncwxgj:gQTIubHy5wQq0
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5012 jusched.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation fb3b9a369d44176c76794d0b8172b1a0a10fb8b79fa59eb98227fa90eeae07fe.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\3ca700c2\jusched.exe fb3b9a369d44176c76794d0b8172b1a0a10fb8b79fa59eb98227fa90eeae07fe.exe File created C:\Program Files (x86)\3ca700c2\3ca700c2 fb3b9a369d44176c76794d0b8172b1a0a10fb8b79fa59eb98227fa90eeae07fe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe 5012 jusched.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4364 wrote to memory of 5012 4364 fb3b9a369d44176c76794d0b8172b1a0a10fb8b79fa59eb98227fa90eeae07fe.exe 78 PID 4364 wrote to memory of 5012 4364 fb3b9a369d44176c76794d0b8172b1a0a10fb8b79fa59eb98227fa90eeae07fe.exe 78 PID 4364 wrote to memory of 5012 4364 fb3b9a369d44176c76794d0b8172b1a0a10fb8b79fa59eb98227fa90eeae07fe.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb3b9a369d44176c76794d0b8172b1a0a10fb8b79fa59eb98227fa90eeae07fe.exe"C:\Users\Admin\AppData\Local\Temp\fb3b9a369d44176c76794d0b8172b1a0a10fb8b79fa59eb98227fa90eeae07fe.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Program Files (x86)\3ca700c2\jusched.exe"C:\Program Files (x86)\3ca700c2\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5012
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5f253efe302d32ab264a76e0ce65be769
SHA1768685ca582abd0af2fbb57ca37752aa98c9372b
SHA25649dca65f362fee401292ed7ada96f96295eab1e589c52e4e66bf4aedda715fdd
SHA5121990d20b462406bbadb22ba43f1ed9d0db6b250881d4ac89ad8cf6e43ca92b2fd31c3a15be1e6e149e42fdb46e58122c15bc7869a82c9490656c80df69fa77c4
-
Filesize
35KB
MD55fb9135d153943882c9a074a029765e3
SHA1e5f814c484125045d15d7afb8182aa34432c0eb0
SHA2566f55cebd95b06c8bc909af377c2f1b7a9b70f9bf4334ee9eac75e0f46cefa083
SHA5126546096c90d24d925118abddc90fb04f5463117cfad1b90b096d96a654a57c6bfff17f6abfacb230cea46e5c3f2f7f7d3cb0c9e52287d1d4b87f775b11f0f233
-
Filesize
35KB
MD55fb9135d153943882c9a074a029765e3
SHA1e5f814c484125045d15d7afb8182aa34432c0eb0
SHA2566f55cebd95b06c8bc909af377c2f1b7a9b70f9bf4334ee9eac75e0f46cefa083
SHA5126546096c90d24d925118abddc90fb04f5463117cfad1b90b096d96a654a57c6bfff17f6abfacb230cea46e5c3f2f7f7d3cb0c9e52287d1d4b87f775b11f0f233