Analysis
-
max time kernel
135s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 00:35
Static task
static1
Behavioral task
behavioral1
Sample
b123d481020439b084064e532e6a158a38fd9c4a279478cda6a2a4929cc59672.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b123d481020439b084064e532e6a158a38fd9c4a279478cda6a2a4929cc59672.exe
Resource
win10v2004-20220812-en
General
-
Target
b123d481020439b084064e532e6a158a38fd9c4a279478cda6a2a4929cc59672.exe
-
Size
196KB
-
MD5
2ebee12be851ff81ad38c76e079b6340
-
SHA1
76b2f46f7289f657bff71d63521ca307a80f8022
-
SHA256
b123d481020439b084064e532e6a158a38fd9c4a279478cda6a2a4929cc59672
-
SHA512
01b33bc21ffd43ef4f6199bf0db2eb0b78d105c618a8aee891e05ca944e4a601ba1b7ee03466d57b3285926638038d27045b4eb9e1dbcf510ef314404c2e2062
-
SSDEEP
1536:aXBYjfC24mFVsIgvo3X4iZpTha5VlA8mP7aoL8E:aX+0mFmIgvo4iZhha5r6aoL8E
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
jusched.exepid process 1768 jusched.exe -
Loads dropped DLL 2 IoCs
Processes:
b123d481020439b084064e532e6a158a38fd9c4a279478cda6a2a4929cc59672.exepid process 1784 b123d481020439b084064e532e6a158a38fd9c4a279478cda6a2a4929cc59672.exe 1784 b123d481020439b084064e532e6a158a38fd9c4a279478cda6a2a4929cc59672.exe -
Drops file in Program Files directory 3 IoCs
Processes:
b123d481020439b084064e532e6a158a38fd9c4a279478cda6a2a4929cc59672.exedescription ioc process File created C:\Program Files (x86)\4cae10e9\jusched.exe b123d481020439b084064e532e6a158a38fd9c4a279478cda6a2a4929cc59672.exe File created C:\Program Files (x86)\4cae10e9\4cae10e9 b123d481020439b084064e532e6a158a38fd9c4a279478cda6a2a4929cc59672.exe File created C:\Program Files (x86)\4cae10e9\info_a b123d481020439b084064e532e6a158a38fd9c4a279478cda6a2a4929cc59672.exe -
Drops file in Windows directory 1 IoCs
Processes:
b123d481020439b084064e532e6a158a38fd9c4a279478cda6a2a4929cc59672.exedescription ioc process File created C:\Windows\Tasks\Update23.job b123d481020439b084064e532e6a158a38fd9c4a279478cda6a2a4929cc59672.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
b123d481020439b084064e532e6a158a38fd9c4a279478cda6a2a4929cc59672.exedescription pid process target process PID 1784 wrote to memory of 1768 1784 b123d481020439b084064e532e6a158a38fd9c4a279478cda6a2a4929cc59672.exe jusched.exe PID 1784 wrote to memory of 1768 1784 b123d481020439b084064e532e6a158a38fd9c4a279478cda6a2a4929cc59672.exe jusched.exe PID 1784 wrote to memory of 1768 1784 b123d481020439b084064e532e6a158a38fd9c4a279478cda6a2a4929cc59672.exe jusched.exe PID 1784 wrote to memory of 1768 1784 b123d481020439b084064e532e6a158a38fd9c4a279478cda6a2a4929cc59672.exe jusched.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b123d481020439b084064e532e6a158a38fd9c4a279478cda6a2a4929cc59672.exe"C:\Users\Admin\AppData\Local\Temp\b123d481020439b084064e532e6a158a38fd9c4a279478cda6a2a4929cc59672.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Program Files (x86)\4cae10e9\jusched.exe"C:\Program Files (x86)\4cae10e9\jusched.exe"2⤵
- Executes dropped EXE
PID:1768
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17B
MD5bff3d8f76e182194c4a2abf1aabba9f3
SHA107e5b604bb505a800b3e0ac16fee483b70595768
SHA2566bc8a4f93eaa1b3e7cfa696855bf6a852cf6555d694bc03e337261a27e58246f
SHA5120c5def3bb01ed166d4135190e131c27be4b6039987e269b6c3fca07677b3c637868397f207df631a098182a6bd3c795e6dd34541f82c5ecd6062441af0af7f50
-
Filesize
12B
MD5731a92fb0c843b25e3e0a8c7e25825a4
SHA13f6b3f5086389639e803483fd1f8bff83e66fb55
SHA256f9dd2c0a06f428f7ba2dc7cde9d174d4394f3b73ab2a52c18c2efa6ba7c830b4
SHA512f571a0bd097b35a586c940d8a5156680933ab1b6b72c18ed43653efe14dc7113085afeec2dbaff0633b99d4e08ea245a405af8593aa3b453ee3c3b1d7bbb17b9
-
Filesize
196KB
MD56a64ae8447144c0bb9c3c5a40ae29ed1
SHA1dc12c12a52880a30c9a07defbe3459f1356a21b5
SHA25678ea5feac851595d4ad064df6eb2c78d1a75126835744ef4075f7f553b6ad41b
SHA512c06c176696b65b7f485bcd1a9af39fe16e7601c46c41064d0de78df1445c3de4364a46a8246e0ea8d7df67ee926844220a35b6383e68406919987dd44b6368cc
-
Filesize
196KB
MD56a64ae8447144c0bb9c3c5a40ae29ed1
SHA1dc12c12a52880a30c9a07defbe3459f1356a21b5
SHA25678ea5feac851595d4ad064df6eb2c78d1a75126835744ef4075f7f553b6ad41b
SHA512c06c176696b65b7f485bcd1a9af39fe16e7601c46c41064d0de78df1445c3de4364a46a8246e0ea8d7df67ee926844220a35b6383e68406919987dd44b6368cc
-
Filesize
196KB
MD56a64ae8447144c0bb9c3c5a40ae29ed1
SHA1dc12c12a52880a30c9a07defbe3459f1356a21b5
SHA25678ea5feac851595d4ad064df6eb2c78d1a75126835744ef4075f7f553b6ad41b
SHA512c06c176696b65b7f485bcd1a9af39fe16e7601c46c41064d0de78df1445c3de4364a46a8246e0ea8d7df67ee926844220a35b6383e68406919987dd44b6368cc