Analysis
-
max time kernel
151s -
max time network
208s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 06:08
Static task
static1
Behavioral task
behavioral1
Sample
e29d8a7a6ef1c03ab236291d5d55a1c158fb8620042112bd3536f3fd677ea9f9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e29d8a7a6ef1c03ab236291d5d55a1c158fb8620042112bd3536f3fd677ea9f9.exe
Resource
win10v2004-20221111-en
General
-
Target
e29d8a7a6ef1c03ab236291d5d55a1c158fb8620042112bd3536f3fd677ea9f9.exe
-
Size
90KB
-
MD5
c70e44dfca36209f59e4ba3b9695f317
-
SHA1
d1d42708169094d2aa6b02270fdb93b334e50422
-
SHA256
e29d8a7a6ef1c03ab236291d5d55a1c158fb8620042112bd3536f3fd677ea9f9
-
SHA512
6cb54e379b8508ca7d0f2ce5a024b1e16fe948cebc2a1ccb209380f886992d4d1234f4d6bce9f5db6ac78936a682bc5e7644b2a40baca9e7f2076337e97b586d
-
SSDEEP
768:4+u501UWr+Mcpb8gYXuqAJ1Y+u4dB4puHChRT+WPq0nyiU3ktgXQ1TTGfL:4+u503xQqvH4r+3JirQ1E
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
griptoloji - Password:
741852
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2244 jusched.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation e29d8a7a6ef1c03ab236291d5d55a1c158fb8620042112bd3536f3fd677ea9f9.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Java\jre-08\bin\jusched.exe e29d8a7a6ef1c03ab236291d5d55a1c158fb8620042112bd3536f3fd677ea9f9.exe File created C:\Program Files (x86)\Java\jre-08\bin\UF e29d8a7a6ef1c03ab236291d5d55a1c158fb8620042112bd3536f3fd677ea9f9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe 2244 jusched.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5064 wrote to memory of 2244 5064 e29d8a7a6ef1c03ab236291d5d55a1c158fb8620042112bd3536f3fd677ea9f9.exe 84 PID 5064 wrote to memory of 2244 5064 e29d8a7a6ef1c03ab236291d5d55a1c158fb8620042112bd3536f3fd677ea9f9.exe 84 PID 5064 wrote to memory of 2244 5064 e29d8a7a6ef1c03ab236291d5d55a1c158fb8620042112bd3536f3fd677ea9f9.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\e29d8a7a6ef1c03ab236291d5d55a1c158fb8620042112bd3536f3fd677ea9f9.exe"C:\Users\Admin\AppData\Local\Temp\e29d8a7a6ef1c03ab236291d5d55a1c158fb8620042112bd3536f3fd677ea9f9.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Program Files (x86)\Java\jre-08\bin\jusched.exe"C:\Program Files (x86)\Java\jre-08\bin\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2244
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD5c70e44dfca36209f59e4ba3b9695f317
SHA1d1d42708169094d2aa6b02270fdb93b334e50422
SHA256e29d8a7a6ef1c03ab236291d5d55a1c158fb8620042112bd3536f3fd677ea9f9
SHA5126cb54e379b8508ca7d0f2ce5a024b1e16fe948cebc2a1ccb209380f886992d4d1234f4d6bce9f5db6ac78936a682bc5e7644b2a40baca9e7f2076337e97b586d
-
Filesize
90KB
MD5c70e44dfca36209f59e4ba3b9695f317
SHA1d1d42708169094d2aa6b02270fdb93b334e50422
SHA256e29d8a7a6ef1c03ab236291d5d55a1c158fb8620042112bd3536f3fd677ea9f9
SHA5126cb54e379b8508ca7d0f2ce5a024b1e16fe948cebc2a1ccb209380f886992d4d1234f4d6bce9f5db6ac78936a682bc5e7644b2a40baca9e7f2076337e97b586d