Analysis

  • max time kernel
    172s
  • max time network
    186s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 00:35

General

  • Target

    89dc7f9bbc4a0a041f15b7ad6f67df12e9ff8555e3f34be3c29d5b4dcd720537.exe

  • Size

    270KB

  • MD5

    274a75731edc8dd17cac8824c7cfdc10

  • SHA1

    305a8c443a4109731d659db046c9e99f40d31db0

  • SHA256

    89dc7f9bbc4a0a041f15b7ad6f67df12e9ff8555e3f34be3c29d5b4dcd720537

  • SHA512

    5bcd72f3e9a4cd5972f8609d41ee2212f72970e1633ce8e0214c246c34c97179f0c18342add20149223cc6bd0afedf8d6c89ae7dd24f50db3e344f577467b112

  • SSDEEP

    3072:853mQ7JtnP5I09qgmBBAWgjSvwN/oSWBAYEQ3/AeohItgsk:UmKJtna2qgmBNgQwGAw/SItg/

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    onthelinux
  • Password:
    741852abc

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\89dc7f9bbc4a0a041f15b7ad6f67df12e9ff8555e3f34be3c29d5b4dcd720537.exe
    "C:\Users\Admin\AppData\Local\Temp\89dc7f9bbc4a0a041f15b7ad6f67df12e9ff8555e3f34be3c29d5b4dcd720537.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1408
    • C:\Program Files (x86)\8c10fd6f\jusched.exe
      "C:\Program Files (x86)\8c10fd6f\jusched.exe"
      2⤵
      • Executes dropped EXE
      PID:3324

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\8c10fd6f\8c10fd6f

    Filesize

    17B

    MD5

    4d77d6b250ffb567743b8dbcdad695b8

    SHA1

    d5a8f98f9433f6d36c74df463cef3e2cf524462d

    SHA256

    7ec7a3a23890c3592f5b762aecf11adbf8831fad11b8048aedfa7315d599c5f2

    SHA512

    5655153049101fd67125d484c81f1ad30b44f36f00e3aabfe8d730a21661f4b394357b60da549289def4311b4cc7bd508d8fd6b8db254cd442b2152f8902bd71

  • C:\Program Files (x86)\8c10fd6f\jusched.exe

    Filesize

    270KB

    MD5

    622ff002741403a240565e7d3c1f166e

    SHA1

    cc662874a68e841aa77d0f675e6e4192554da552

    SHA256

    2da4a3bf4056e7c3bfa55256179016f8ddf836229423ab1bb05fd627dcbed5f7

    SHA512

    a779e54a2b109b660e014ae4182570710ce524ac45912c4094f7afb7668c6e7062cc45a151c51805aee4771f0327f709b33ce5130ca7bfafc3cf52db49b4e8ca

  • C:\Program Files (x86)\8c10fd6f\jusched.exe

    Filesize

    270KB

    MD5

    622ff002741403a240565e7d3c1f166e

    SHA1

    cc662874a68e841aa77d0f675e6e4192554da552

    SHA256

    2da4a3bf4056e7c3bfa55256179016f8ddf836229423ab1bb05fd627dcbed5f7

    SHA512

    a779e54a2b109b660e014ae4182570710ce524ac45912c4094f7afb7668c6e7062cc45a151c51805aee4771f0327f709b33ce5130ca7bfafc3cf52db49b4e8ca

  • memory/1408-132-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB

  • memory/1408-136-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB

  • memory/3324-133-0x0000000000000000-mapping.dmp

  • memory/3324-137-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB

  • memory/3324-139-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB