Analysis
-
max time kernel
144s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 16:31
Static task
static1
Behavioral task
behavioral1
Sample
2d55f00fc63f567fbe1b8ad7969b255f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2d55f00fc63f567fbe1b8ad7969b255f.exe
Resource
win10v2004-20231215-en
General
-
Target
2d55f00fc63f567fbe1b8ad7969b255f.exe
-
Size
209KB
-
MD5
2d55f00fc63f567fbe1b8ad7969b255f
-
SHA1
3e4fba8775a72a51ce6236174336ff7ce057088e
-
SHA256
53d40f13ccb6b523fa8349abfd4a0cb6a6b46dadb254b19be95add329101541b
-
SHA512
b05660c104494449eb6e2c0491e9410cb149abc651b4797761e4fd9ed607a48c710252765570aa2b8077ca993fb5f7335da8469985083a54154c6dcc0e2940ba
-
SSDEEP
1536:SNSXbc74YTOnlNSUL09atT0mBBA7aKSvIYFwAfdvoWQO57:SEo75OnPSI09qgmBBAGKSvwovoW99
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2408 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 2832 2d55f00fc63f567fbe1b8ad7969b255f.exe 2832 2d55f00fc63f567fbe1b8ad7969b255f.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\57cb4ac9\jusched.exe 2d55f00fc63f567fbe1b8ad7969b255f.exe File created C:\Program Files (x86)\57cb4ac9\57cb4ac9 2d55f00fc63f567fbe1b8ad7969b255f.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Update23.job 2d55f00fc63f567fbe1b8ad7969b255f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2832 wrote to memory of 2408 2832 2d55f00fc63f567fbe1b8ad7969b255f.exe 28 PID 2832 wrote to memory of 2408 2832 2d55f00fc63f567fbe1b8ad7969b255f.exe 28 PID 2832 wrote to memory of 2408 2832 2d55f00fc63f567fbe1b8ad7969b255f.exe 28 PID 2832 wrote to memory of 2408 2832 2d55f00fc63f567fbe1b8ad7969b255f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d55f00fc63f567fbe1b8ad7969b255f.exe"C:\Users\Admin\AppData\Local\Temp\2d55f00fc63f567fbe1b8ad7969b255f.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Program Files (x86)\57cb4ac9\jusched.exe"C:\Program Files (x86)\57cb4ac9\jusched.exe"2⤵
- Executes dropped EXE
PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17B
MD53330ebaaa7e9f4630f4ad4c156be59d8
SHA140375cf8e68671e0100e725de5cd5c6657b9f722
SHA2562c8451d5dca9e68ec3af7f318c5d874fbdfea9e89e7b5f9922b4dbd65f027e15
SHA512b7631f9685bac9f81aa6bf53afd839910773e108989bbb79ba39cafabbe6b6994ed2fde44911c9f7f24b45c9745d6e80cd9f01975bfb765561df4881f7dad696