Analysis
-
max time kernel
152s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2022 08:29
Static task
static1
Behavioral task
behavioral1
Sample
f26217509b502c0d726d54440cd83aadde9481f367410eaa49ceafefae95b6bc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f26217509b502c0d726d54440cd83aadde9481f367410eaa49ceafefae95b6bc.exe
Resource
win10v2004-20220812-en
General
-
Target
f26217509b502c0d726d54440cd83aadde9481f367410eaa49ceafefae95b6bc.exe
-
Size
144KB
-
MD5
6ce7ec00f1d0674f6107f4d281f13cd9
-
SHA1
5af8a4961b8d398c1038d1caa4ea9430465ab07b
-
SHA256
f26217509b502c0d726d54440cd83aadde9481f367410eaa49ceafefae95b6bc
-
SHA512
9954fcc9b8c3c0d5284284abe81e9310b16533a811ad04725bc1c57096eddb8252581a184a2ac9e117d0eff0b6637c9eac4084f08d494b39d7a28b425ef25214
-
SSDEEP
768:j/5inm+cd5rHemPXkqUEphjVuvios1rPr4adL0NqlJMU60+ppQ1TTGfLdB:jRsvcdcQjosnvnZ6LQ1Ef
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
griptoloji - Password:
741852
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4628 jusched.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation f26217509b502c0d726d54440cd83aadde9481f367410eaa49ceafefae95b6bc.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Java\jre-09\bin\jusched.exe f26217509b502c0d726d54440cd83aadde9481f367410eaa49ceafefae95b6bc.exe File opened for modification C:\Program Files (x86)\Java\jre-09\bin\jusched.exe f26217509b502c0d726d54440cd83aadde9481f367410eaa49ceafefae95b6bc.exe File created C:\Program Files (x86)\Java\jre-09\bin\UF f26217509b502c0d726d54440cd83aadde9481f367410eaa49ceafefae95b6bc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe 4628 jusched.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4976 wrote to memory of 4628 4976 f26217509b502c0d726d54440cd83aadde9481f367410eaa49ceafefae95b6bc.exe 81 PID 4976 wrote to memory of 4628 4976 f26217509b502c0d726d54440cd83aadde9481f367410eaa49ceafefae95b6bc.exe 81 PID 4976 wrote to memory of 4628 4976 f26217509b502c0d726d54440cd83aadde9481f367410eaa49ceafefae95b6bc.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\f26217509b502c0d726d54440cd83aadde9481f367410eaa49ceafefae95b6bc.exe"C:\Users\Admin\AppData\Local\Temp\f26217509b502c0d726d54440cd83aadde9481f367410eaa49ceafefae95b6bc.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4628
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144KB
MD53449d08023b293e94e55027ef8e46a19
SHA1bc617db91d2ca32843c880d2718fcec6a48759a8
SHA25639de1934cbbf44157133cca27ed66db09dbb31d82a0b9124d17d024fbebbf800
SHA512d6022b92ea4b908167c995a79dbc6c4d0d1227637826d7017f4b2d740fcb3c7b23b0807e8753471a2387daae350d564c6f4163a57bc893580b1aab1220edab83
-
Filesize
144KB
MD53449d08023b293e94e55027ef8e46a19
SHA1bc617db91d2ca32843c880d2718fcec6a48759a8
SHA25639de1934cbbf44157133cca27ed66db09dbb31d82a0b9124d17d024fbebbf800
SHA512d6022b92ea4b908167c995a79dbc6c4d0d1227637826d7017f4b2d740fcb3c7b23b0807e8753471a2387daae350d564c6f4163a57bc893580b1aab1220edab83