Analysis
-
max time kernel
152s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 03:46
Static task
static1
Behavioral task
behavioral1
Sample
240b2777c9d7aff061400cb64410dfa6b39ed1e687b26f67cee8ede6e76a8427.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
240b2777c9d7aff061400cb64410dfa6b39ed1e687b26f67cee8ede6e76a8427.exe
Resource
win10v2004-20220812-en
General
-
Target
240b2777c9d7aff061400cb64410dfa6b39ed1e687b26f67cee8ede6e76a8427.exe
-
Size
64KB
-
MD5
5040d81428a4592f8124d3eaf21c1c50
-
SHA1
33630accd96aaa535cb01631dcc0267631090f08
-
SHA256
240b2777c9d7aff061400cb64410dfa6b39ed1e687b26f67cee8ede6e76a8427
-
SHA512
e434d0cb7caf758c138dfec44731cbb32332375af4f2ee941358b148a4f3ef3d74e6d97935e90f88ed395066a99bfa908191e1cdb3eacadfb0a9677f0a116c0b
-
SSDEEP
768:0Lg70B0Xz+M0pb5wXuqAR1Y+u4FxgxunyhmL+WPi0H1iUYstg7Q1TTGfL:0Lg70KuqHH4jZHUhPQ1E
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
griptoloji - Password:
741852
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4296 jusched.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 240b2777c9d7aff061400cb64410dfa6b39ed1e687b26f67cee8ede6e76a8427.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Java\jre-08\bin\UF 240b2777c9d7aff061400cb64410dfa6b39ed1e687b26f67cee8ede6e76a8427.exe File created C:\Program Files (x86)\Java\jre-08\bin\jusched.exe 240b2777c9d7aff061400cb64410dfa6b39ed1e687b26f67cee8ede6e76a8427.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe 4296 jusched.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5104 wrote to memory of 4296 5104 240b2777c9d7aff061400cb64410dfa6b39ed1e687b26f67cee8ede6e76a8427.exe 81 PID 5104 wrote to memory of 4296 5104 240b2777c9d7aff061400cb64410dfa6b39ed1e687b26f67cee8ede6e76a8427.exe 81 PID 5104 wrote to memory of 4296 5104 240b2777c9d7aff061400cb64410dfa6b39ed1e687b26f67cee8ede6e76a8427.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\240b2777c9d7aff061400cb64410dfa6b39ed1e687b26f67cee8ede6e76a8427.exe"C:\Users\Admin\AppData\Local\Temp\240b2777c9d7aff061400cb64410dfa6b39ed1e687b26f67cee8ede6e76a8427.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Program Files (x86)\Java\jre-08\bin\jusched.exe"C:\Program Files (x86)\Java\jre-08\bin\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4296
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD55040d81428a4592f8124d3eaf21c1c50
SHA133630accd96aaa535cb01631dcc0267631090f08
SHA256240b2777c9d7aff061400cb64410dfa6b39ed1e687b26f67cee8ede6e76a8427
SHA512e434d0cb7caf758c138dfec44731cbb32332375af4f2ee941358b148a4f3ef3d74e6d97935e90f88ed395066a99bfa908191e1cdb3eacadfb0a9677f0a116c0b
-
Filesize
64KB
MD55040d81428a4592f8124d3eaf21c1c50
SHA133630accd96aaa535cb01631dcc0267631090f08
SHA256240b2777c9d7aff061400cb64410dfa6b39ed1e687b26f67cee8ede6e76a8427
SHA512e434d0cb7caf758c138dfec44731cbb32332375af4f2ee941358b148a4f3ef3d74e6d97935e90f88ed395066a99bfa908191e1cdb3eacadfb0a9677f0a116c0b