Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 21:52
Static task
static1
Behavioral task
behavioral1
Sample
1da678eba846ab1874e0228c4990e3d0.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1da678eba846ab1874e0228c4990e3d0.exe
Resource
win10v2004-20231215-en
General
-
Target
1da678eba846ab1874e0228c4990e3d0.exe
-
Size
76KB
-
MD5
1da678eba846ab1874e0228c4990e3d0
-
SHA1
84763b823c60658795b9b9d8e16c2a7c91e477bb
-
SHA256
e616e29dae1f319c14a46402b9060ec6c6b735fb5ebaae363fcd4525c1898e5c
-
SHA512
922bd350811cea28b2b485b629495e349a6001c867f836aa2177f3ba76cbc5dbe3f431b71ecc33f7030f57abb09aa30f7de2dcee99f7d39169c7a60f93de3dfe
-
SSDEEP
768:0JWroFsbMm1fTZLMYLDY1sbMmQHMVQV93sfVAVvVxnVrVZVMV/VSVYuECM6cGRDI:AWqJCtLMekJjs9NB+Jbdu4yLEZs
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\winupdate = "c:\\windows\\jusched.exe" 1da678eba846ab1874e0228c4990e3d0.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinService = "c:\\windows\\hosth.exe" 1da678eba846ab1874e0228c4990e3d0.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created \??\c:\windows\hosth.exe 1da678eba846ab1874e0228c4990e3d0.exe File opened for modification \??\c:\windows\hosth.exe 1da678eba846ab1874e0228c4990e3d0.exe File created \??\c:\windows\jusched.exe 1da678eba846ab1874e0228c4990e3d0.exe File opened for modification \??\c:\windows\jusched.exe 1da678eba846ab1874e0228c4990e3d0.exe File opened for modification C:\WINDOWS\jusched.exe 1da678eba846ab1874e0228c4990e3d0.exe File opened for modification C:\WINDOWS\hosth.exe 1da678eba846ab1874e0228c4990e3d0.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main 1da678eba846ab1874e0228c4990e3d0.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2196 1da678eba846ab1874e0228c4990e3d0.exe 2196 1da678eba846ab1874e0228c4990e3d0.exe 2196 1da678eba846ab1874e0228c4990e3d0.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\50CZ0NQ6\errorPageStrings[1]
Filesize2KB
MD5e3e4a98353f119b80b323302f26b78fa
SHA120ee35a370cdd3a8a7d04b506410300fd0a6a864
SHA2569466d620dc57835a2475f8f71e304f54aee7160e134ba160baae0f19e5e71e66
SHA512d8e4d73c76804a5abebd5dbc3a86dcdb6e73107b873175a8de67332c113fb7c4899890bf7972e467866fa4cd100a7e2a10a770e5a9c41cbf23b54351b771dcee
-
Filesize
76KB
MD51da678eba846ab1874e0228c4990e3d0
SHA184763b823c60658795b9b9d8e16c2a7c91e477bb
SHA256e616e29dae1f319c14a46402b9060ec6c6b735fb5ebaae363fcd4525c1898e5c
SHA512922bd350811cea28b2b485b629495e349a6001c867f836aa2177f3ba76cbc5dbe3f431b71ecc33f7030f57abb09aa30f7de2dcee99f7d39169c7a60f93de3dfe