Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-10-2023 14:30

General

  • Target

    55d1b1cbb3637601c14dfff15ea7a80c_JC.exe

  • Size

    57KB

  • MD5

    55d1b1cbb3637601c14dfff15ea7a80c

  • SHA1

    2d526fa1a174cfcea97aa7ea4ec0129c7707c475

  • SHA256

    cc14abaccd135f54c96536cc09b83f4ce49ab9bd74072f31362057d344e8de95

  • SHA512

    2536b0d71abefc1af6e1a711cb25ec57f17b79e3e8e2b50afc584badd7e37bdc85522216b379dd649b143a764b9403073bbaef81ae7bb820c5a652cccf1faecf

  • SSDEEP

    1536:JdXkE87nccOtwqsIcGIjAPdrl86QpCXofD:rUE87cxtplAKri6WCXofD

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    onthelinux
  • Password:
    741852abc

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55d1b1cbb3637601c14dfff15ea7a80c_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\55d1b1cbb3637601c14dfff15ea7a80c_JC.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4296
    • C:\Program Files (x86)\8c76222\jusched.exe
      "C:\Program Files (x86)\8c76222\jusched.exe"
      2⤵
      • Executes dropped EXE
      PID:2020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\8c76222\8c76222

    Filesize

    17B

    MD5

    4d77d6b250ffb567743b8dbcdad695b8

    SHA1

    d5a8f98f9433f6d36c74df463cef3e2cf524462d

    SHA256

    7ec7a3a23890c3592f5b762aecf11adbf8831fad11b8048aedfa7315d599c5f2

    SHA512

    5655153049101fd67125d484c81f1ad30b44f36f00e3aabfe8d730a21661f4b394357b60da549289def4311b4cc7bd508d8fd6b8db254cd442b2152f8902bd71

  • C:\Program Files (x86)\8c76222\jusched.exe

    Filesize

    58KB

    MD5

    73247fff5604ead2d70431b2059091a6

    SHA1

    de7c25c72359f5ddffd8741098373c42a987c32a

    SHA256

    5b3c04cb3e1742b1cefd6dc96e8621756bc11ac10a84d323f9428d64cd66ee07

    SHA512

    0203631e3403209dc0ebb8241506d15d5059b049b25567ab89b660eba22a51a759d18e09fab09f2192c1326ea658e47ad294825bd9105124b9064271177b6954

  • C:\Program Files (x86)\8c76222\jusched.exe

    Filesize

    58KB

    MD5

    73247fff5604ead2d70431b2059091a6

    SHA1

    de7c25c72359f5ddffd8741098373c42a987c32a

    SHA256

    5b3c04cb3e1742b1cefd6dc96e8621756bc11ac10a84d323f9428d64cd66ee07

    SHA512

    0203631e3403209dc0ebb8241506d15d5059b049b25567ab89b660eba22a51a759d18e09fab09f2192c1326ea658e47ad294825bd9105124b9064271177b6954

  • C:\Program Files (x86)\8c76222\jusched.exe

    Filesize

    58KB

    MD5

    73247fff5604ead2d70431b2059091a6

    SHA1

    de7c25c72359f5ddffd8741098373c42a987c32a

    SHA256

    5b3c04cb3e1742b1cefd6dc96e8621756bc11ac10a84d323f9428d64cd66ee07

    SHA512

    0203631e3403209dc0ebb8241506d15d5059b049b25567ab89b660eba22a51a759d18e09fab09f2192c1326ea658e47ad294825bd9105124b9064271177b6954

  • memory/2020-21-0x00000000007F0000-0x00000000007F8000-memory.dmp

    Filesize

    32KB

  • memory/2020-17-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/2020-20-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/2020-23-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/4296-1-0x00000000006F0000-0x00000000006F8000-memory.dmp

    Filesize

    32KB

  • memory/4296-18-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/4296-4-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/4296-0-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/4296-2-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB