Analysis
-
max time kernel
148s -
max time network
193s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 03:52
Static task
static1
Behavioral task
behavioral1
Sample
cbac7a2c70e84b2c0c3d8ad5a984cd71e3020f0eab4359167d01633a4649a9cd.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cbac7a2c70e84b2c0c3d8ad5a984cd71e3020f0eab4359167d01633a4649a9cd.exe
Resource
win10v2004-20220812-en
General
-
Target
cbac7a2c70e84b2c0c3d8ad5a984cd71e3020f0eab4359167d01633a4649a9cd.exe
-
Size
208KB
-
MD5
7f34e60eb96d8c913ea178e801d8bfa5
-
SHA1
c1c93ae17420eeb682c2137eed7defd5660e1297
-
SHA256
cbac7a2c70e84b2c0c3d8ad5a984cd71e3020f0eab4359167d01633a4649a9cd
-
SHA512
29c715f94da598ae3992c8c48327ae0f3bdb1329f642fa6648b465490f022f26a3dcdb07ebe4aeb32f33623c83f2fb154d2de23b818cdf33cb02ce3118b9d763
-
SSDEEP
3072:VVHgCc4xGvbwcU9KQ2BBAHmaPxNVosb5E:ICc4xGxWKQ2Bonx
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 376 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 1380 cbac7a2c70e84b2c0c3d8ad5a984cd71e3020f0eab4359167d01633a4649a9cd.exe 1380 cbac7a2c70e84b2c0c3d8ad5a984cd71e3020f0eab4359167d01633a4649a9cd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run cbac7a2c70e84b2c0c3d8ad5a984cd71e3020f0eab4359167d01633a4649a9cd.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run cbac7a2c70e84b2c0c3d8ad5a984cd71e3020f0eab4359167d01633a4649a9cd.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\fbbe5fbd\jusched.exe cbac7a2c70e84b2c0c3d8ad5a984cd71e3020f0eab4359167d01633a4649a9cd.exe File created C:\Program Files (x86)\fbbe5fbd\fbbe5fbd cbac7a2c70e84b2c0c3d8ad5a984cd71e3020f0eab4359167d01633a4649a9cd.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Update23.job cbac7a2c70e84b2c0c3d8ad5a984cd71e3020f0eab4359167d01633a4649a9cd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1380 wrote to memory of 376 1380 cbac7a2c70e84b2c0c3d8ad5a984cd71e3020f0eab4359167d01633a4649a9cd.exe 28 PID 1380 wrote to memory of 376 1380 cbac7a2c70e84b2c0c3d8ad5a984cd71e3020f0eab4359167d01633a4649a9cd.exe 28 PID 1380 wrote to memory of 376 1380 cbac7a2c70e84b2c0c3d8ad5a984cd71e3020f0eab4359167d01633a4649a9cd.exe 28 PID 1380 wrote to memory of 376 1380 cbac7a2c70e84b2c0c3d8ad5a984cd71e3020f0eab4359167d01633a4649a9cd.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbac7a2c70e84b2c0c3d8ad5a984cd71e3020f0eab4359167d01633a4649a9cd.exe"C:\Users\Admin\AppData\Local\Temp\cbac7a2c70e84b2c0c3d8ad5a984cd71e3020f0eab4359167d01633a4649a9cd.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Program Files (x86)\fbbe5fbd\jusched.exe"C:\Program Files (x86)\fbbe5fbd\jusched.exe"2⤵
- Executes dropped EXE
PID:376
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17B
MD5134c1d489094d6d3399f65b0e9aebc1f
SHA1612a57fbe6ed3ab9c15b39451171d813314a28d5
SHA25654f9150d1268f7b4b83dd9fc3ec32274bf749715a5806ff3ca5262f5427d6781
SHA512b09bf60e4850d05261d81a124a647dd111f42480224eae8a3bd2f64736c38119953703f868ad34194a7ae6dad6aabff4081ba73df262bbe9f5327867c56a48ed
-
Filesize
208KB
MD5ec5c370f45fb4a95bd2980c3d5c0432d
SHA196f05b48a98061a4511b51335267f6ea7fc34c98
SHA2565beb189a6d07243ee03f7c482756b54daa347e30b591aeda9384418b2aaf52fe
SHA5125ccd5b0cffee4302d914f73dc350ff7089199d83cb1c0753b4c2c605a1d779f3d6846fd417552a38d3fd8ea47b36273e460a962c4d2d48d3b64a69d4facc3c92
-
Filesize
208KB
MD5ec5c370f45fb4a95bd2980c3d5c0432d
SHA196f05b48a98061a4511b51335267f6ea7fc34c98
SHA2565beb189a6d07243ee03f7c482756b54daa347e30b591aeda9384418b2aaf52fe
SHA5125ccd5b0cffee4302d914f73dc350ff7089199d83cb1c0753b4c2c605a1d779f3d6846fd417552a38d3fd8ea47b36273e460a962c4d2d48d3b64a69d4facc3c92
-
Filesize
208KB
MD5ec5c370f45fb4a95bd2980c3d5c0432d
SHA196f05b48a98061a4511b51335267f6ea7fc34c98
SHA2565beb189a6d07243ee03f7c482756b54daa347e30b591aeda9384418b2aaf52fe
SHA5125ccd5b0cffee4302d914f73dc350ff7089199d83cb1c0753b4c2c605a1d779f3d6846fd417552a38d3fd8ea47b36273e460a962c4d2d48d3b64a69d4facc3c92