Analysis

  • max time kernel
    4s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-12-2023 01:34

General

  • Target

    49b3b8d84fbb92c0cb6e75dcdc2f8152.exe

  • Size

    208KB

  • MD5

    49b3b8d84fbb92c0cb6e75dcdc2f8152

  • SHA1

    9f0383e316d8a9254d8ce90d43ec0461a28ad296

  • SHA256

    555d1f9e4aa8ffcd1fa2e6b4d82905951a5d580f55487e8627a378e0d33251db

  • SHA512

    c775c9e3449ab5dc49ca76b22365d68717774a81543567b4c35640b62368fad289d83aaabf9f80c048bd6c9deb6e722949b64fd8798dcb0739ef2c6fbc1bcee8

  • SSDEEP

    3072:xVHgCc4xGvbwcU9KQ2BBAHmaPxBVoob5EW:ECc4xGxWKQ2Bonx3

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\49b3b8d84fbb92c0cb6e75dcdc2f8152.exe
    "C:\Users\Admin\AppData\Local\Temp\49b3b8d84fbb92c0cb6e75dcdc2f8152.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2692
    • C:\Program Files (x86)\cdc9e81c\jusched.exe
      "C:\Program Files (x86)\cdc9e81c\jusched.exe"
      2⤵
      • Executes dropped EXE
      PID:4600

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\cdc9e81c\cdc9e81c

    Filesize

    17B

    MD5

    134c1d489094d6d3399f65b0e9aebc1f

    SHA1

    612a57fbe6ed3ab9c15b39451171d813314a28d5

    SHA256

    54f9150d1268f7b4b83dd9fc3ec32274bf749715a5806ff3ca5262f5427d6781

    SHA512

    b09bf60e4850d05261d81a124a647dd111f42480224eae8a3bd2f64736c38119953703f868ad34194a7ae6dad6aabff4081ba73df262bbe9f5327867c56a48ed

  • C:\Program Files (x86)\cdc9e81c\jusched.exe

    Filesize

    18KB

    MD5

    6c69cda61c0a68b4a3264a09bc939ade

    SHA1

    71637c25ea24ee2534dc0b69ee70967c99202560

    SHA256

    c69d24b92ea7b11ba6ecb80ceade39fba302e4c5c4ac17dcf15c19a8bb3ea68d

    SHA512

    a3f7612a4039a612568ec900f5193061dbb8dd864b7d73bc881062c5c73d845e7b5485768db7aa11f78d66ec1badc5b88781d113894de26fb95dde113d4ece3a

  • C:\Program Files (x86)\cdc9e81c\jusched.exe

    Filesize

    2KB

    MD5

    2d553a49ca72f7494e61c03ca45d30e9

    SHA1

    65e8dbbeafac93b2f0817bebe8a9bd3fa0cd6459

    SHA256

    f326c05ab1cca89f4cb14bfcbb88b51fb3c7315418747132a53e76bf6deec094

    SHA512

    0399b18592a265a1a57cc52f1895c6f7375533ecd253e4e58588c188505567c483ed571ac4c71bf6643673cc0dfd6eebe781b98972e4e09d04fc4e0603369cdd

  • C:\Program Files (x86)\cdc9e81c\jusched.exe

    Filesize

    5KB

    MD5

    0056bfbe48e5d97c1f03cd7a17a75e0e

    SHA1

    891d3504c70f9c8cecc0db6540b03aa93b655db7

    SHA256

    ffc366d02a92a90bfe58ef6334e675edf05fad68722367245a7ef0b2c4ea465b

    SHA512

    b83e24bbcff6b99c986804890ea74149abbca701e9ebe556526bbe5f1bbf11ff93f97aff154c1f0681118621d4ff73f7543137826b5251647cb590d23bde30f0

  • memory/2692-0-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2692-15-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/4600-14-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB