Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    17-10-2022 08:27

General

  • Target

    06b686af70dabea5596025b1d67aca507a57a2b2ee9c2b65e1545045b7dbafaf.exe

  • Size

    235KB

  • MD5

    b6e624b8f2bb48fbb116519bbafc23e4

  • SHA1

    6339cbda21f625e3b5b4d353c0f86486c65a2431

  • SHA256

    06b686af70dabea5596025b1d67aca507a57a2b2ee9c2b65e1545045b7dbafaf

  • SHA512

    b523aff9bac27cff9006237c7b798add7305dbee3f3fc13842290d40edba3c4d7a26c58624b94275334ae359eaab71ef09744be304762bd5932a26200d5b6125

  • SSDEEP

    3072:VVHgCc4xGvbwcU9KQ2BBAHmaPxiVojb5ErUcMLHT:ICc4xGxWKQ2BonxZcMH

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.byethost12.com
  • Port:
    21
  • Username:
    b12_8082975
  • Password:
    951753zx

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    onthelinux
  • Password:
    741852abc

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06b686af70dabea5596025b1d67aca507a57a2b2ee9c2b65e1545045b7dbafaf.exe
    "C:\Users\Admin\AppData\Local\Temp\06b686af70dabea5596025b1d67aca507a57a2b2ee9c2b65e1545045b7dbafaf.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1452
    • C:\Program Files (x86)\fc739aaf\jusched.exe
      "C:\Program Files (x86)\fc739aaf\jusched.exe"
      2⤵
      • Executes dropped EXE
      PID:1276

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\fc739aaf\fc739aaf

    Filesize

    17B

    MD5

    134c1d489094d6d3399f65b0e9aebc1f

    SHA1

    612a57fbe6ed3ab9c15b39451171d813314a28d5

    SHA256

    54f9150d1268f7b4b83dd9fc3ec32274bf749715a5806ff3ca5262f5427d6781

    SHA512

    b09bf60e4850d05261d81a124a647dd111f42480224eae8a3bd2f64736c38119953703f868ad34194a7ae6dad6aabff4081ba73df262bbe9f5327867c56a48ed

  • C:\Program Files (x86)\fc739aaf\jusched.exe

    Filesize

    235KB

    MD5

    43ab880d60dbe2554ae409f032a45156

    SHA1

    861e7f7b7d4437acc76667a252de5cdce41c0546

    SHA256

    ec08b0345ecfe33930be4468ebbe4e34d60e9de50da45de36706f08cd564e33a

    SHA512

    b9492dfcbe6654c259ac936b0a53322b53fda173f3c41e6814472b6ce7e2da1cdcef04d350bfd1c806e70cc582035dc938f2f19c4e21f7f1071f46bc0687245f

  • \Program Files (x86)\fc739aaf\jusched.exe

    Filesize

    235KB

    MD5

    43ab880d60dbe2554ae409f032a45156

    SHA1

    861e7f7b7d4437acc76667a252de5cdce41c0546

    SHA256

    ec08b0345ecfe33930be4468ebbe4e34d60e9de50da45de36706f08cd564e33a

    SHA512

    b9492dfcbe6654c259ac936b0a53322b53fda173f3c41e6814472b6ce7e2da1cdcef04d350bfd1c806e70cc582035dc938f2f19c4e21f7f1071f46bc0687245f

  • \Program Files (x86)\fc739aaf\jusched.exe

    Filesize

    235KB

    MD5

    43ab880d60dbe2554ae409f032a45156

    SHA1

    861e7f7b7d4437acc76667a252de5cdce41c0546

    SHA256

    ec08b0345ecfe33930be4468ebbe4e34d60e9de50da45de36706f08cd564e33a

    SHA512

    b9492dfcbe6654c259ac936b0a53322b53fda173f3c41e6814472b6ce7e2da1cdcef04d350bfd1c806e70cc582035dc938f2f19c4e21f7f1071f46bc0687245f

  • memory/1276-61-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1452-54-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1452-55-0x0000000075041000-0x0000000075043000-memory.dmp

    Filesize

    8KB

  • memory/1452-60-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB