Analysis
-
max time kernel
4s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 01:34
Static task
static1
Behavioral task
behavioral1
Sample
49b3b8d84fbb92c0cb6e75dcdc2f8152.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
49b3b8d84fbb92c0cb6e75dcdc2f8152.exe
Resource
win10v2004-20231222-en
General
-
Target
49b3b8d84fbb92c0cb6e75dcdc2f8152.exe
-
Size
208KB
-
MD5
49b3b8d84fbb92c0cb6e75dcdc2f8152
-
SHA1
9f0383e316d8a9254d8ce90d43ec0461a28ad296
-
SHA256
555d1f9e4aa8ffcd1fa2e6b4d82905951a5d580f55487e8627a378e0d33251db
-
SHA512
c775c9e3449ab5dc49ca76b22365d68717774a81543567b4c35640b62368fad289d83aaabf9f80c048bd6c9deb6e722949b64fd8798dcb0739ef2c6fbc1bcee8
-
SSDEEP
3072:xVHgCc4xGvbwcU9KQ2BBAHmaPxBVoob5EW:ECc4xGxWKQ2Bonx3
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 49b3b8d84fbb92c0cb6e75dcdc2f8152.exe -
Executes dropped EXE 1 IoCs
pid Process 4600 jusched.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\cdc9e81c\jusched.exe 49b3b8d84fbb92c0cb6e75dcdc2f8152.exe File created C:\Program Files (x86)\cdc9e81c\cdc9e81c 49b3b8d84fbb92c0cb6e75dcdc2f8152.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Update23.job 49b3b8d84fbb92c0cb6e75dcdc2f8152.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2692 wrote to memory of 4600 2692 49b3b8d84fbb92c0cb6e75dcdc2f8152.exe 91 PID 2692 wrote to memory of 4600 2692 49b3b8d84fbb92c0cb6e75dcdc2f8152.exe 91 PID 2692 wrote to memory of 4600 2692 49b3b8d84fbb92c0cb6e75dcdc2f8152.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\49b3b8d84fbb92c0cb6e75dcdc2f8152.exe"C:\Users\Admin\AppData\Local\Temp\49b3b8d84fbb92c0cb6e75dcdc2f8152.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files (x86)\cdc9e81c\jusched.exe"C:\Program Files (x86)\cdc9e81c\jusched.exe"2⤵
- Executes dropped EXE
PID:4600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17B
MD5134c1d489094d6d3399f65b0e9aebc1f
SHA1612a57fbe6ed3ab9c15b39451171d813314a28d5
SHA25654f9150d1268f7b4b83dd9fc3ec32274bf749715a5806ff3ca5262f5427d6781
SHA512b09bf60e4850d05261d81a124a647dd111f42480224eae8a3bd2f64736c38119953703f868ad34194a7ae6dad6aabff4081ba73df262bbe9f5327867c56a48ed
-
Filesize
18KB
MD56c69cda61c0a68b4a3264a09bc939ade
SHA171637c25ea24ee2534dc0b69ee70967c99202560
SHA256c69d24b92ea7b11ba6ecb80ceade39fba302e4c5c4ac17dcf15c19a8bb3ea68d
SHA512a3f7612a4039a612568ec900f5193061dbb8dd864b7d73bc881062c5c73d845e7b5485768db7aa11f78d66ec1badc5b88781d113894de26fb95dde113d4ece3a
-
Filesize
2KB
MD52d553a49ca72f7494e61c03ca45d30e9
SHA165e8dbbeafac93b2f0817bebe8a9bd3fa0cd6459
SHA256f326c05ab1cca89f4cb14bfcbb88b51fb3c7315418747132a53e76bf6deec094
SHA5120399b18592a265a1a57cc52f1895c6f7375533ecd253e4e58588c188505567c483ed571ac4c71bf6643673cc0dfd6eebe781b98972e4e09d04fc4e0603369cdd
-
Filesize
5KB
MD50056bfbe48e5d97c1f03cd7a17a75e0e
SHA1891d3504c70f9c8cecc0db6540b03aa93b655db7
SHA256ffc366d02a92a90bfe58ef6334e675edf05fad68722367245a7ef0b2c4ea465b
SHA512b83e24bbcff6b99c986804890ea74149abbca701e9ebe556526bbe5f1bbf11ff93f97aff154c1f0681118621d4ff73f7543137826b5251647cb590d23bde30f0