Analysis

  • max time kernel
    122s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    15/10/2023, 19:36

General

  • Target

    3b09c2f2689e7c752092ac08ac1c94d0_exe32.exe

  • Size

    88KB

  • MD5

    3b09c2f2689e7c752092ac08ac1c94d0

  • SHA1

    b4216fe85eb4fcaff5eb4b154954486ab5a78b8c

  • SHA256

    b1c30abd717d493c7ef1c6c235b8ec72e3ce83509e06326528d75e3d2b6c4f54

  • SHA512

    b2ec1f8f3e95ee2f122b65358a1c1979722121e992dfad785883944df28b4879a11ee0b1c59659a341b2c906ce35bdfed623fd446c781e933e9fea0bf7182f0e

  • SSDEEP

    1536:JdXkE87nccOtwqsIcGIjAPdrl86QpCXs8T3yv:rUE87cxtplAKri6WCXs8I

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    onthelinux
  • Password:
    741852abc

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b09c2f2689e7c752092ac08ac1c94d0_exe32.exe
    "C:\Users\Admin\AppData\Local\Temp\3b09c2f2689e7c752092ac08ac1c94d0_exe32.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1256
    • C:\Program Files (x86)\d96d69a0\jusched.exe
      "C:\Program Files (x86)\d96d69a0\jusched.exe"
      2⤵
      • Executes dropped EXE
      PID:3064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\d96d69a0\d96d69a0

    Filesize

    17B

    MD5

    4d77d6b250ffb567743b8dbcdad695b8

    SHA1

    d5a8f98f9433f6d36c74df463cef3e2cf524462d

    SHA256

    7ec7a3a23890c3592f5b762aecf11adbf8831fad11b8048aedfa7315d599c5f2

    SHA512

    5655153049101fd67125d484c81f1ad30b44f36f00e3aabfe8d730a21661f4b394357b60da549289def4311b4cc7bd508d8fd6b8db254cd442b2152f8902bd71

  • C:\Program Files (x86)\d96d69a0\jusched.exe

    Filesize

    88KB

    MD5

    0525c4a855279833506d7ffbdbeef2f0

    SHA1

    8288a8c4a496cf7f6d904c06fe7e8297e2a45e4c

    SHA256

    a6d0712aa9bea2f6172381ecdd3e106657af18da0c2843fc1204907991eb9975

    SHA512

    02fa3f45d50265a80af281424d408ba9bae0b8d67dab5adac8e5d6a105c792986ab40e822f1070af0068522cc8ce51f8c2b99361b6b39fdedca22a7af13e6aa5

  • C:\Program Files (x86)\d96d69a0\jusched.exe

    Filesize

    88KB

    MD5

    0525c4a855279833506d7ffbdbeef2f0

    SHA1

    8288a8c4a496cf7f6d904c06fe7e8297e2a45e4c

    SHA256

    a6d0712aa9bea2f6172381ecdd3e106657af18da0c2843fc1204907991eb9975

    SHA512

    02fa3f45d50265a80af281424d408ba9bae0b8d67dab5adac8e5d6a105c792986ab40e822f1070af0068522cc8ce51f8c2b99361b6b39fdedca22a7af13e6aa5

  • \Program Files (x86)\d96d69a0\jusched.exe

    Filesize

    88KB

    MD5

    0525c4a855279833506d7ffbdbeef2f0

    SHA1

    8288a8c4a496cf7f6d904c06fe7e8297e2a45e4c

    SHA256

    a6d0712aa9bea2f6172381ecdd3e106657af18da0c2843fc1204907991eb9975

    SHA512

    02fa3f45d50265a80af281424d408ba9bae0b8d67dab5adac8e5d6a105c792986ab40e822f1070af0068522cc8ce51f8c2b99361b6b39fdedca22a7af13e6aa5

  • \Program Files (x86)\d96d69a0\jusched.exe

    Filesize

    88KB

    MD5

    0525c4a855279833506d7ffbdbeef2f0

    SHA1

    8288a8c4a496cf7f6d904c06fe7e8297e2a45e4c

    SHA256

    a6d0712aa9bea2f6172381ecdd3e106657af18da0c2843fc1204907991eb9975

    SHA512

    02fa3f45d50265a80af281424d408ba9bae0b8d67dab5adac8e5d6a105c792986ab40e822f1070af0068522cc8ce51f8c2b99361b6b39fdedca22a7af13e6aa5

  • memory/1256-12-0x0000000001FE0000-0x000000000202C000-memory.dmp

    Filesize

    304KB

  • memory/1256-0-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1256-8-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1256-1-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1256-17-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1256-4-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1256-2-0x00000000002B0000-0x00000000002B8000-memory.dmp

    Filesize

    32KB

  • memory/3064-20-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/3064-22-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/3064-23-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB