Analysis
-
max time kernel
152s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2022 06:16
Behavioral task
behavioral1
Sample
5d9461c16fbe4b7e7fb7142505b0f738ab3e1fe93c4b762e3a96f55c023217ad.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5d9461c16fbe4b7e7fb7142505b0f738ab3e1fe93c4b762e3a96f55c023217ad.exe
Resource
win10v2004-20220901-en
General
-
Target
5d9461c16fbe4b7e7fb7142505b0f738ab3e1fe93c4b762e3a96f55c023217ad.exe
-
Size
22KB
-
MD5
487d8f023a1ece2cc88098fd219f0a40
-
SHA1
6b6d8eb7f62682337654b86a56382c1cb2a857aa
-
SHA256
5d9461c16fbe4b7e7fb7142505b0f738ab3e1fe93c4b762e3a96f55c023217ad
-
SHA512
058798c6f380dee48302e5c820078a55f34bc745a384b28823c72ca062671e70ead3f12ba3cecffed6a836bac552e599af9aeda602941a0d8978e0e5daf44d94
-
SSDEEP
384:dykBpbi8bcji30d1BCT/ob/xDbH580i02Jd+mSd+2Fo6zE:Mka+3sCT4ju0i0++E2+6z
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3324 jusched.exe -
resource yara_rule behavioral2/memory/2040-132-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/files/0x0003000000022dd5-136.dat upx behavioral2/files/0x0003000000022dd5-137.dat upx behavioral2/memory/4912-141-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/4912-143-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/4912-144-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/3324-146-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/4912-148-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/2040-149-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/4912-150-0x0000000000400000-0x000000000040C000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 5d9461c16fbe4b7e7fb7142505b0f738ab3e1fe93c4b762e3a96f55c023217ad.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Quick Start = "C:\\Users\\Admin\\jusched.exe" svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3324 set thread context of 4912 3324 jusched.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2040 5d9461c16fbe4b7e7fb7142505b0f738ab3e1fe93c4b762e3a96f55c023217ad.exe 3324 jusched.exe 4912 svchost.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2040 wrote to memory of 3324 2040 5d9461c16fbe4b7e7fb7142505b0f738ab3e1fe93c4b762e3a96f55c023217ad.exe 85 PID 2040 wrote to memory of 3324 2040 5d9461c16fbe4b7e7fb7142505b0f738ab3e1fe93c4b762e3a96f55c023217ad.exe 85 PID 2040 wrote to memory of 3324 2040 5d9461c16fbe4b7e7fb7142505b0f738ab3e1fe93c4b762e3a96f55c023217ad.exe 85 PID 3324 wrote to memory of 4912 3324 jusched.exe 86 PID 3324 wrote to memory of 4912 3324 jusched.exe 86 PID 3324 wrote to memory of 4912 3324 jusched.exe 86 PID 3324 wrote to memory of 4912 3324 jusched.exe 86 PID 3324 wrote to memory of 4912 3324 jusched.exe 86 PID 3324 wrote to memory of 4912 3324 jusched.exe 86 PID 3324 wrote to memory of 4912 3324 jusched.exe 86 PID 3324 wrote to memory of 4912 3324 jusched.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d9461c16fbe4b7e7fb7142505b0f738ab3e1fe93c4b762e3a96f55c023217ad.exe"C:\Users\Admin\AppData\Local\Temp\5d9461c16fbe4b7e7fb7142505b0f738ab3e1fe93c4b762e3a96f55c023217ad.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\jusched.exe"C:\Users\Admin\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:4912
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD5487d8f023a1ece2cc88098fd219f0a40
SHA16b6d8eb7f62682337654b86a56382c1cb2a857aa
SHA2565d9461c16fbe4b7e7fb7142505b0f738ab3e1fe93c4b762e3a96f55c023217ad
SHA512058798c6f380dee48302e5c820078a55f34bc745a384b28823c72ca062671e70ead3f12ba3cecffed6a836bac552e599af9aeda602941a0d8978e0e5daf44d94
-
Filesize
22KB
MD5487d8f023a1ece2cc88098fd219f0a40
SHA16b6d8eb7f62682337654b86a56382c1cb2a857aa
SHA2565d9461c16fbe4b7e7fb7142505b0f738ab3e1fe93c4b762e3a96f55c023217ad
SHA512058798c6f380dee48302e5c820078a55f34bc745a384b28823c72ca062671e70ead3f12ba3cecffed6a836bac552e599af9aeda602941a0d8978e0e5daf44d94