Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2022, 21:53

General

  • Target

    fb3b9a369d44176c76794d0b8172b1a0a10fb8b79fa59eb98227fa90eeae07fe.exe

  • Size

    35KB

  • MD5

    0c7fabf8b74ef813abb8f71532e38eaa

  • SHA1

    a534f1e5b95b054e36e58f3cda0c46caf3a5b91a

  • SHA256

    fb3b9a369d44176c76794d0b8172b1a0a10fb8b79fa59eb98227fa90eeae07fe

  • SHA512

    bd81db1a192759e77792f0470fbdc71d69d85a4213753f667cd45b6d6a4f27dea8e7ca78b9e24f54f43e7188632f7aabedece2b184382d51b311b7a901674e4d

  • SSDEEP

    768:mzQYScGrIubHuYtvdxwYHw5FAe2Qqncwxgj:gQTIubHy5wQq0

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    onthelinux
  • Password:
    741852abc

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb3b9a369d44176c76794d0b8172b1a0a10fb8b79fa59eb98227fa90eeae07fe.exe
    "C:\Users\Admin\AppData\Local\Temp\fb3b9a369d44176c76794d0b8172b1a0a10fb8b79fa59eb98227fa90eeae07fe.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:4364
    • C:\Program Files (x86)\3ca700c2\jusched.exe
      "C:\Program Files (x86)\3ca700c2\jusched.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:5012

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\3ca700c2\3ca700c2

    Filesize

    13B

    MD5

    f253efe302d32ab264a76e0ce65be769

    SHA1

    768685ca582abd0af2fbb57ca37752aa98c9372b

    SHA256

    49dca65f362fee401292ed7ada96f96295eab1e589c52e4e66bf4aedda715fdd

    SHA512

    1990d20b462406bbadb22ba43f1ed9d0db6b250881d4ac89ad8cf6e43ca92b2fd31c3a15be1e6e149e42fdb46e58122c15bc7869a82c9490656c80df69fa77c4

  • C:\Program Files (x86)\3ca700c2\jusched.exe

    Filesize

    35KB

    MD5

    5fb9135d153943882c9a074a029765e3

    SHA1

    e5f814c484125045d15d7afb8182aa34432c0eb0

    SHA256

    6f55cebd95b06c8bc909af377c2f1b7a9b70f9bf4334ee9eac75e0f46cefa083

    SHA512

    6546096c90d24d925118abddc90fb04f5463117cfad1b90b096d96a654a57c6bfff17f6abfacb230cea46e5c3f2f7f7d3cb0c9e52287d1d4b87f775b11f0f233

  • C:\Program Files (x86)\3ca700c2\jusched.exe

    Filesize

    35KB

    MD5

    5fb9135d153943882c9a074a029765e3

    SHA1

    e5f814c484125045d15d7afb8182aa34432c0eb0

    SHA256

    6f55cebd95b06c8bc909af377c2f1b7a9b70f9bf4334ee9eac75e0f46cefa083

    SHA512

    6546096c90d24d925118abddc90fb04f5463117cfad1b90b096d96a654a57c6bfff17f6abfacb230cea46e5c3f2f7f7d3cb0c9e52287d1d4b87f775b11f0f233