Analysis
-
max time kernel
152s -
max time network
187s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 00:35
Static task
static1
Behavioral task
behavioral1
Sample
a2c549cdd28fc49eca71c79a8ecc7de45ebc6678b1e448736593507f6927abb3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a2c549cdd28fc49eca71c79a8ecc7de45ebc6678b1e448736593507f6927abb3.exe
Resource
win10v2004-20220812-en
General
-
Target
a2c549cdd28fc49eca71c79a8ecc7de45ebc6678b1e448736593507f6927abb3.exe
-
Size
196KB
-
MD5
15000c34c7486e8752a944daf068bd70
-
SHA1
326a8528d489d951b745d436404587ec4a3141e1
-
SHA256
a2c549cdd28fc49eca71c79a8ecc7de45ebc6678b1e448736593507f6927abb3
-
SHA512
34eafeaec968224a2e778e232b0599e75fe9816f2b650ef825b974bcb941ff6a5cc4d6a7d0565c6e06fd8dd4f64ae225d0559628d81fc3292a8b51a3bd4e198f
-
SSDEEP
1536:jZ/fgkAqJlV+n1EgGHo7P1YPx28Vayon5sn:j1gkZl0nt/P1YPx/on0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
jusched.exepid process 480 jusched.exe -
Loads dropped DLL 2 IoCs
Processes:
a2c549cdd28fc49eca71c79a8ecc7de45ebc6678b1e448736593507f6927abb3.exepid process 1484 a2c549cdd28fc49eca71c79a8ecc7de45ebc6678b1e448736593507f6927abb3.exe 1484 a2c549cdd28fc49eca71c79a8ecc7de45ebc6678b1e448736593507f6927abb3.exe -
Drops file in Program Files directory 2 IoCs
Processes:
a2c549cdd28fc49eca71c79a8ecc7de45ebc6678b1e448736593507f6927abb3.exedescription ioc process File created C:\Program Files (x86)\6265744d\jusched.exe a2c549cdd28fc49eca71c79a8ecc7de45ebc6678b1e448736593507f6927abb3.exe File created C:\Program Files (x86)\6265744d\6265744d a2c549cdd28fc49eca71c79a8ecc7de45ebc6678b1e448736593507f6927abb3.exe -
Drops file in Windows directory 1 IoCs
Processes:
a2c549cdd28fc49eca71c79a8ecc7de45ebc6678b1e448736593507f6927abb3.exedescription ioc process File created C:\Windows\Tasks\Update23.job a2c549cdd28fc49eca71c79a8ecc7de45ebc6678b1e448736593507f6927abb3.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
a2c549cdd28fc49eca71c79a8ecc7de45ebc6678b1e448736593507f6927abb3.exedescription pid process target process PID 1484 wrote to memory of 480 1484 a2c549cdd28fc49eca71c79a8ecc7de45ebc6678b1e448736593507f6927abb3.exe jusched.exe PID 1484 wrote to memory of 480 1484 a2c549cdd28fc49eca71c79a8ecc7de45ebc6678b1e448736593507f6927abb3.exe jusched.exe PID 1484 wrote to memory of 480 1484 a2c549cdd28fc49eca71c79a8ecc7de45ebc6678b1e448736593507f6927abb3.exe jusched.exe PID 1484 wrote to memory of 480 1484 a2c549cdd28fc49eca71c79a8ecc7de45ebc6678b1e448736593507f6927abb3.exe jusched.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2c549cdd28fc49eca71c79a8ecc7de45ebc6678b1e448736593507f6927abb3.exe"C:\Users\Admin\AppData\Local\Temp\a2c549cdd28fc49eca71c79a8ecc7de45ebc6678b1e448736593507f6927abb3.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Program Files (x86)\6265744d\jusched.exe"C:\Program Files (x86)\6265744d\jusched.exe"2⤵
- Executes dropped EXE
PID:480
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17B
MD580e7928b124479791c52c09d831495f6
SHA194c8cb5ce4b1c1e70a2802efc22395c1003fc8bd
SHA256a6bb92ad6bdd253818b2660e9befc8e3689b3bee61233f7a67a6ca0695acab12
SHA5125183e48a8dc4f64277b7a0303f97b704ffa63dcc7256aaddb69994ef108f2f2922d9ec9a62eda403eed6c4f66dd719297c9d24e997f662eded63a49810493d2d
-
Filesize
196KB
MD54309a8b44592a7c968652efe41b06c09
SHA1a4d91e9f6a911d01acf87dd8fc8ca5e0fd186e65
SHA2562f507af43c6da9da6073c30e06ee28ccfe3565007697ee7537b1653953058afd
SHA5120831ed45aea6f44561d2ee038e5ebfa217fc5648296bd2a1454516015e50fd824247bbef59de75ee11288b4b5dcb90afa91c03bc1c544a66bd19622c6a11ac24
-
Filesize
196KB
MD54309a8b44592a7c968652efe41b06c09
SHA1a4d91e9f6a911d01acf87dd8fc8ca5e0fd186e65
SHA2562f507af43c6da9da6073c30e06ee28ccfe3565007697ee7537b1653953058afd
SHA5120831ed45aea6f44561d2ee038e5ebfa217fc5648296bd2a1454516015e50fd824247bbef59de75ee11288b4b5dcb90afa91c03bc1c544a66bd19622c6a11ac24
-
Filesize
196KB
MD54309a8b44592a7c968652efe41b06c09
SHA1a4d91e9f6a911d01acf87dd8fc8ca5e0fd186e65
SHA2562f507af43c6da9da6073c30e06ee28ccfe3565007697ee7537b1653953058afd
SHA5120831ed45aea6f44561d2ee038e5ebfa217fc5648296bd2a1454516015e50fd824247bbef59de75ee11288b4b5dcb90afa91c03bc1c544a66bd19622c6a11ac24