Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2022, 21:54

General

  • Target

    a501ed1ea830e6f7567685f43f196d645a771c438b24ec200bc6ade7328889cb.exe

  • Size

    204KB

  • MD5

    70d4c46f4ac1af20978a32b7294ced60

  • SHA1

    77c9bc1d398d8b7773151bf146f26fb22d7dcb10

  • SHA256

    a501ed1ea830e6f7567685f43f196d645a771c438b24ec200bc6ade7328889cb

  • SHA512

    31ee574ceada609d7a302340239e2a8074645f996131ff9c6e22aea75a0395f29069f29202d09f2da689854b0d4a12fe65e829070d14a035f452264fa48d074b

  • SSDEEP

    3072:xePgCctxGv4QcU9KQ2BBA2waPxatmolCG:NCctxGsWKQ2Bx5x6OG

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.byethost12.com
  • Port:
    21
  • Username:
    b12_8082975
  • Password:
    951753zx

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    onthelinux
  • Password:
    741852abc

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a501ed1ea830e6f7567685f43f196d645a771c438b24ec200bc6ade7328889cb.exe
    "C:\Users\Admin\AppData\Local\Temp\a501ed1ea830e6f7567685f43f196d645a771c438b24ec200bc6ade7328889cb.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\Program Files (x86)\c4b9936e\jusched.exe
      "C:\Program Files (x86)\c4b9936e\jusched.exe"
      2⤵
      • Executes dropped EXE
      PID:2824

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\c4b9936e\c4b9936e

    Filesize

    17B

    MD5

    552bb86ed2797d3fd12ac0d273afaf75

    SHA1

    6e8633f9c24590779acbd3dd14c60f856320bc0a

    SHA256

    3ef9ff5da8272fd1b14c83f12c8d28fd9dbf32d56bcb714921032b02557fe789

    SHA512

    dab57227de02f4667cc8e2ec47566088b473caa0387caffbdfde37f3400da7d4f67dd222e83a4fa93592694bbcff7c52a2bcec074868baf221bc47d9370c8d2c

  • C:\Program Files (x86)\c4b9936e\jusched.exe

    Filesize

    204KB

    MD5

    881c7c347c8ec54bf813fe8aba782047

    SHA1

    57cedc9535bdc2f8ab522404a0b44aceeb550c80

    SHA256

    3da11808aca62a826403dc4e39fe7166c6fe76903c24908a8907ead2694747df

    SHA512

    ee9f638f3ac7c2aa7542c4f3f51a94f0ed4fc13508da99f6d93a0db2a232310a26e72a3d2fb6605e0a9a93a124a4a63a3487266556ec66767e362d8eecec16f8

  • C:\Program Files (x86)\c4b9936e\jusched.exe

    Filesize

    204KB

    MD5

    881c7c347c8ec54bf813fe8aba782047

    SHA1

    57cedc9535bdc2f8ab522404a0b44aceeb550c80

    SHA256

    3da11808aca62a826403dc4e39fe7166c6fe76903c24908a8907ead2694747df

    SHA512

    ee9f638f3ac7c2aa7542c4f3f51a94f0ed4fc13508da99f6d93a0db2a232310a26e72a3d2fb6605e0a9a93a124a4a63a3487266556ec66767e362d8eecec16f8