Analysis
-
max time kernel
147s -
max time network
174s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 01:03
Static task
static1
Behavioral task
behavioral1
Sample
94635735a0e89f24ee1a1b48f30b70bd024221e4786abfc46f5f682931bdb2f3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
94635735a0e89f24ee1a1b48f30b70bd024221e4786abfc46f5f682931bdb2f3.exe
Resource
win10v2004-20220901-en
General
-
Target
94635735a0e89f24ee1a1b48f30b70bd024221e4786abfc46f5f682931bdb2f3.exe
-
Size
62KB
-
MD5
c9aeab11434364422129922a38df8a5c
-
SHA1
63628a6b62e5ebc67f1e54fdb37df128becc38f3
-
SHA256
94635735a0e89f24ee1a1b48f30b70bd024221e4786abfc46f5f682931bdb2f3
-
SHA512
f6724f69232e407408eb4b4bef319d5fa0c0e2f684935757a4c3ce69578c36d4d7718b08da99e24818a4d16b453db0b471390ca037a6cf607ae994879f668dd1
-
SSDEEP
768:mhQ5Lbcp+MGOpbN5XdiAo1EXgBh04uXtle+WPi0CSlHhhItUYQzTGfL:UiLbcmUikXgPWD2BhoQk
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
griptoloji - Password:
741852
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1572 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 1708 94635735a0e89f24ee1a1b48f30b70bd024221e4786abfc46f5f682931bdb2f3.exe 1708 94635735a0e89f24ee1a1b48f30b70bd024221e4786abfc46f5f682931bdb2f3.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Java\jre-07\bin\jusched.exe 94635735a0e89f24ee1a1b48f30b70bd024221e4786abfc46f5f682931bdb2f3.exe File created C:\Program Files (x86)\Java\jre-07\bin\UF 94635735a0e89f24ee1a1b48f30b70bd024221e4786abfc46f5f682931bdb2f3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1708 wrote to memory of 1572 1708 94635735a0e89f24ee1a1b48f30b70bd024221e4786abfc46f5f682931bdb2f3.exe 28 PID 1708 wrote to memory of 1572 1708 94635735a0e89f24ee1a1b48f30b70bd024221e4786abfc46f5f682931bdb2f3.exe 28 PID 1708 wrote to memory of 1572 1708 94635735a0e89f24ee1a1b48f30b70bd024221e4786abfc46f5f682931bdb2f3.exe 28 PID 1708 wrote to memory of 1572 1708 94635735a0e89f24ee1a1b48f30b70bd024221e4786abfc46f5f682931bdb2f3.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\94635735a0e89f24ee1a1b48f30b70bd024221e4786abfc46f5f682931bdb2f3.exe"C:\Users\Admin\AppData\Local\Temp\94635735a0e89f24ee1a1b48f30b70bd024221e4786abfc46f5f682931bdb2f3.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Program Files (x86)\Java\jre-07\bin\jusched.exe"C:\Program Files (x86)\Java\jre-07\bin\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1572
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD5c9aeab11434364422129922a38df8a5c
SHA163628a6b62e5ebc67f1e54fdb37df128becc38f3
SHA25694635735a0e89f24ee1a1b48f30b70bd024221e4786abfc46f5f682931bdb2f3
SHA512f6724f69232e407408eb4b4bef319d5fa0c0e2f684935757a4c3ce69578c36d4d7718b08da99e24818a4d16b453db0b471390ca037a6cf607ae994879f668dd1
-
Filesize
62KB
MD5c9aeab11434364422129922a38df8a5c
SHA163628a6b62e5ebc67f1e54fdb37df128becc38f3
SHA25694635735a0e89f24ee1a1b48f30b70bd024221e4786abfc46f5f682931bdb2f3
SHA512f6724f69232e407408eb4b4bef319d5fa0c0e2f684935757a4c3ce69578c36d4d7718b08da99e24818a4d16b453db0b471390ca037a6cf607ae994879f668dd1
-
Filesize
62KB
MD5c9aeab11434364422129922a38df8a5c
SHA163628a6b62e5ebc67f1e54fdb37df128becc38f3
SHA25694635735a0e89f24ee1a1b48f30b70bd024221e4786abfc46f5f682931bdb2f3
SHA512f6724f69232e407408eb4b4bef319d5fa0c0e2f684935757a4c3ce69578c36d4d7718b08da99e24818a4d16b453db0b471390ca037a6cf607ae994879f668dd1