Analysis
-
max time kernel
45s -
max time network
55s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 07:13
Static task
static1
Behavioral task
behavioral1
Sample
2cef0684ead4062b47f7c80f75cbe6dd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2cef0684ead4062b47f7c80f75cbe6dd.exe
Resource
win10v2004-20231215-en
General
-
Target
2cef0684ead4062b47f7c80f75cbe6dd.exe
-
Size
34KB
-
MD5
2cef0684ead4062b47f7c80f75cbe6dd
-
SHA1
a54fc14df5a757f4d5661a8df59cb02c18255500
-
SHA256
45bd54cc08e97edfac4e01084a9b4810ddd773a74413bdadae3dcd484982b0b3
-
SHA512
5e27ca0dd32454dd5ea014210d5510165ff7daab9720d6d119cd0e03636d4a70f35712ab164ca2e721b800d2975bb3fc9c4df35c92661c450fec0ae34414714d
-
SSDEEP
768:cflivXrVKpVhKvtxwYHwVFoeAQJmucwU1:ylqrVKprVuQJS
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation 2cef0684ead4062b47f7c80f75cbe6dd.exe -
Executes dropped EXE 1 IoCs
pid Process 4056 jusched.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\79a47cb5\jusched.exe 2cef0684ead4062b47f7c80f75cbe6dd.exe File created C:\Program Files (x86)\79a47cb5\79a47cb5 2cef0684ead4062b47f7c80f75cbe6dd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe 4056 jusched.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3336 wrote to memory of 4056 3336 2cef0684ead4062b47f7c80f75cbe6dd.exe 94 PID 3336 wrote to memory of 4056 3336 2cef0684ead4062b47f7c80f75cbe6dd.exe 94 PID 3336 wrote to memory of 4056 3336 2cef0684ead4062b47f7c80f75cbe6dd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\2cef0684ead4062b47f7c80f75cbe6dd.exe"C:\Users\Admin\AppData\Local\Temp\2cef0684ead4062b47f7c80f75cbe6dd.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Program Files (x86)\79a47cb5\jusched.exe"C:\Program Files (x86)\79a47cb5\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5f253efe302d32ab264a76e0ce65be769
SHA1768685ca582abd0af2fbb57ca37752aa98c9372b
SHA25649dca65f362fee401292ed7ada96f96295eab1e589c52e4e66bf4aedda715fdd
SHA5121990d20b462406bbadb22ba43f1ed9d0db6b250881d4ac89ad8cf6e43ca92b2fd31c3a15be1e6e149e42fdb46e58122c15bc7869a82c9490656c80df69fa77c4
-
Filesize
17KB
MD54e6848f342b2c1d199be313b4a74c13c
SHA1eb5153d7ec1a76ea760bbd5b990b6a18b45af9cc
SHA256329751b28c03b8166983a6c8a0d4d1e879ec316e205e94f0c7d00e3b909bc7fe
SHA512cdf7321b571f201c5b41b5ed27cbdf01a396cbcc5e48682beb5224ccb834db9d3c86dcec0f8a049e1076c72da3af5b7cacf2ceec9648989270add587d5013538
-
Filesize
34KB
MD504804dea46b384f54f919db525b6d958
SHA111d2ed4244fc4ca0f59ea3daaf8c42fd79adf7b1
SHA2568e315faced5b5087e216a96bd74e0dcf13d0052e0d344fac0773cc7aaf6993db
SHA512346745c67c69cd1db2ef5cfc0cd2c44f241380b7501af5f9f534e79ae6c28e4207de14baf38597810e0dd2bb85f32c64db35455ffe6b3e83cca9670616789984
-
Filesize
27KB
MD545b59f2103d71effe7ef56883f39741a
SHA1ec4795ef97f52c3e1084a42e97bc8ec9cf0279df
SHA25697d21f73b3a5ee09d6a985dd9aac352606f809c09605c63a4273251ba4042ebf
SHA512a9d3d3820580e08701afebff31b2641b4f472e3f0fd60779a787c7115dd71d34125536c001ca1b56fb0fbab9319ea41f3ac6a9b7aa304a8fb712450191d578e4