Analysis
-
max time kernel
156s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
38c5c29f932b91f7728e4911a81e6bff9e92a6eaa6b5e9586eb24c582e1c3ce0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
38c5c29f932b91f7728e4911a81e6bff9e92a6eaa6b5e9586eb24c582e1c3ce0.exe
Resource
win10v2004-20220812-en
General
-
Target
38c5c29f932b91f7728e4911a81e6bff9e92a6eaa6b5e9586eb24c582e1c3ce0.exe
-
Size
34KB
-
MD5
6cbbbc178c836418c410965722d984e4
-
SHA1
737ad75da28441164703fb3f2657604a3537f2ca
-
SHA256
38c5c29f932b91f7728e4911a81e6bff9e92a6eaa6b5e9586eb24c582e1c3ce0
-
SHA512
8079b16573148b31881b2f56c55aa17dd4bafc4d5606970c46c42e1c333d2cb2fcc79fef7e5801d4908b20e2d5295c9f2a08a127bd19cdce83f9b956d62943b2
-
SSDEEP
768:cflivXrVKpVhKvtxwYHwVFoeAQQmucwUU/C9:ylqrVKprVuQQE
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3996 jusched.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 38c5c29f932b91f7728e4911a81e6bff9e92a6eaa6b5e9586eb24c582e1c3ce0.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\af388657\jusched.exe 38c5c29f932b91f7728e4911a81e6bff9e92a6eaa6b5e9586eb24c582e1c3ce0.exe File created C:\Program Files (x86)\af388657\af388657 38c5c29f932b91f7728e4911a81e6bff9e92a6eaa6b5e9586eb24c582e1c3ce0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe 3996 jusched.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4304 wrote to memory of 3996 4304 38c5c29f932b91f7728e4911a81e6bff9e92a6eaa6b5e9586eb24c582e1c3ce0.exe 80 PID 4304 wrote to memory of 3996 4304 38c5c29f932b91f7728e4911a81e6bff9e92a6eaa6b5e9586eb24c582e1c3ce0.exe 80 PID 4304 wrote to memory of 3996 4304 38c5c29f932b91f7728e4911a81e6bff9e92a6eaa6b5e9586eb24c582e1c3ce0.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\38c5c29f932b91f7728e4911a81e6bff9e92a6eaa6b5e9586eb24c582e1c3ce0.exe"C:\Users\Admin\AppData\Local\Temp\38c5c29f932b91f7728e4911a81e6bff9e92a6eaa6b5e9586eb24c582e1c3ce0.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Program Files (x86)\af388657\jusched.exe"C:\Program Files (x86)\af388657\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3996
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5f253efe302d32ab264a76e0ce65be769
SHA1768685ca582abd0af2fbb57ca37752aa98c9372b
SHA25649dca65f362fee401292ed7ada96f96295eab1e589c52e4e66bf4aedda715fdd
SHA5121990d20b462406bbadb22ba43f1ed9d0db6b250881d4ac89ad8cf6e43ca92b2fd31c3a15be1e6e149e42fdb46e58122c15bc7869a82c9490656c80df69fa77c4
-
Filesize
34KB
MD533d3619bf3336a1e0a15eddf523c7adf
SHA183a6710266e3d3b8b08fe94dd843aef9832a744c
SHA2569159c9475084423cd0a3b8fb440253cde9079744628bad1cebb19288a8ac25d4
SHA512062d2b5aa25ff508021379f2363fd8ffcf215d60018a58b2b5c01d57487ace50c1fa66281a114d0905cb43bccce31f5a72746c2318d2cc6b07c54a7390082c0f
-
Filesize
34KB
MD533d3619bf3336a1e0a15eddf523c7adf
SHA183a6710266e3d3b8b08fe94dd843aef9832a744c
SHA2569159c9475084423cd0a3b8fb440253cde9079744628bad1cebb19288a8ac25d4
SHA512062d2b5aa25ff508021379f2363fd8ffcf215d60018a58b2b5c01d57487ace50c1fa66281a114d0905cb43bccce31f5a72746c2318d2cc6b07c54a7390082c0f