Analysis
-
max time kernel
146s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 06:08
Static task
static1
Behavioral task
behavioral1
Sample
e29d8a7a6ef1c03ab236291d5d55a1c158fb8620042112bd3536f3fd677ea9f9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e29d8a7a6ef1c03ab236291d5d55a1c158fb8620042112bd3536f3fd677ea9f9.exe
Resource
win10v2004-20221111-en
General
-
Target
e29d8a7a6ef1c03ab236291d5d55a1c158fb8620042112bd3536f3fd677ea9f9.exe
-
Size
90KB
-
MD5
c70e44dfca36209f59e4ba3b9695f317
-
SHA1
d1d42708169094d2aa6b02270fdb93b334e50422
-
SHA256
e29d8a7a6ef1c03ab236291d5d55a1c158fb8620042112bd3536f3fd677ea9f9
-
SHA512
6cb54e379b8508ca7d0f2ce5a024b1e16fe948cebc2a1ccb209380f886992d4d1234f4d6bce9f5db6ac78936a682bc5e7644b2a40baca9e7f2076337e97b586d
-
SSDEEP
768:4+u501UWr+Mcpb8gYXuqAJ1Y+u4dB4puHChRT+WPq0nyiU3ktgXQ1TTGfL:4+u503xQqvH4r+3JirQ1E
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
griptoloji - Password:
741852
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1684 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 1168 e29d8a7a6ef1c03ab236291d5d55a1c158fb8620042112bd3536f3fd677ea9f9.exe 1168 e29d8a7a6ef1c03ab236291d5d55a1c158fb8620042112bd3536f3fd677ea9f9.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Java\jre-08\bin\jusched.exe e29d8a7a6ef1c03ab236291d5d55a1c158fb8620042112bd3536f3fd677ea9f9.exe File created C:\Program Files (x86)\Java\jre-08\bin\UF e29d8a7a6ef1c03ab236291d5d55a1c158fb8620042112bd3536f3fd677ea9f9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe 1684 jusched.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1168 wrote to memory of 1684 1168 e29d8a7a6ef1c03ab236291d5d55a1c158fb8620042112bd3536f3fd677ea9f9.exe 27 PID 1168 wrote to memory of 1684 1168 e29d8a7a6ef1c03ab236291d5d55a1c158fb8620042112bd3536f3fd677ea9f9.exe 27 PID 1168 wrote to memory of 1684 1168 e29d8a7a6ef1c03ab236291d5d55a1c158fb8620042112bd3536f3fd677ea9f9.exe 27 PID 1168 wrote to memory of 1684 1168 e29d8a7a6ef1c03ab236291d5d55a1c158fb8620042112bd3536f3fd677ea9f9.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\e29d8a7a6ef1c03ab236291d5d55a1c158fb8620042112bd3536f3fd677ea9f9.exe"C:\Users\Admin\AppData\Local\Temp\e29d8a7a6ef1c03ab236291d5d55a1c158fb8620042112bd3536f3fd677ea9f9.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Program Files (x86)\Java\jre-08\bin\jusched.exe"C:\Program Files (x86)\Java\jre-08\bin\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1684
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD5c70e44dfca36209f59e4ba3b9695f317
SHA1d1d42708169094d2aa6b02270fdb93b334e50422
SHA256e29d8a7a6ef1c03ab236291d5d55a1c158fb8620042112bd3536f3fd677ea9f9
SHA5126cb54e379b8508ca7d0f2ce5a024b1e16fe948cebc2a1ccb209380f886992d4d1234f4d6bce9f5db6ac78936a682bc5e7644b2a40baca9e7f2076337e97b586d
-
Filesize
90KB
MD5c70e44dfca36209f59e4ba3b9695f317
SHA1d1d42708169094d2aa6b02270fdb93b334e50422
SHA256e29d8a7a6ef1c03ab236291d5d55a1c158fb8620042112bd3536f3fd677ea9f9
SHA5126cb54e379b8508ca7d0f2ce5a024b1e16fe948cebc2a1ccb209380f886992d4d1234f4d6bce9f5db6ac78936a682bc5e7644b2a40baca9e7f2076337e97b586d
-
Filesize
90KB
MD5c70e44dfca36209f59e4ba3b9695f317
SHA1d1d42708169094d2aa6b02270fdb93b334e50422
SHA256e29d8a7a6ef1c03ab236291d5d55a1c158fb8620042112bd3536f3fd677ea9f9
SHA5126cb54e379b8508ca7d0f2ce5a024b1e16fe948cebc2a1ccb209380f886992d4d1234f4d6bce9f5db6ac78936a682bc5e7644b2a40baca9e7f2076337e97b586d