Analysis
-
max time kernel
164s -
max time network
201s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 14:31
Static task
static1
Behavioral task
behavioral1
Sample
39eca44b5f7876aa9e17855fa0ec7c7f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
39eca44b5f7876aa9e17855fa0ec7c7f.exe
Resource
win10v2004-20231215-en
General
-
Target
39eca44b5f7876aa9e17855fa0ec7c7f.exe
-
Size
208KB
-
MD5
39eca44b5f7876aa9e17855fa0ec7c7f
-
SHA1
48d622b59fbcdab50811ad76515a59028ed23831
-
SHA256
a4134490d2c4ae3be615b9fd37e3d27e13af842d854ae986d06d18c3908b1380
-
SHA512
bb5cdf13485f0a3e9a2387f2302e1d3ba5f776d02607c04084315aed32a14861ed9bb2f38bc97e1e2ea2e5fea983a53d7798a064dc875786a6311ee970dc5507
-
SSDEEP
3072:XChJgYMm4xf9cU9KQ2BxA59SPMqOoWn29O:rYMm4xiWKQ2BiCMyO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2952 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 3012 39eca44b5f7876aa9e17855fa0ec7c7f.exe 3012 39eca44b5f7876aa9e17855fa0ec7c7f.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\b9c73b2a\b9c73b2a 39eca44b5f7876aa9e17855fa0ec7c7f.exe File created C:\Program Files (x86)\b9c73b2a\jusched.exe 39eca44b5f7876aa9e17855fa0ec7c7f.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Update23.job 39eca44b5f7876aa9e17855fa0ec7c7f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2952 3012 39eca44b5f7876aa9e17855fa0ec7c7f.exe 29 PID 3012 wrote to memory of 2952 3012 39eca44b5f7876aa9e17855fa0ec7c7f.exe 29 PID 3012 wrote to memory of 2952 3012 39eca44b5f7876aa9e17855fa0ec7c7f.exe 29 PID 3012 wrote to memory of 2952 3012 39eca44b5f7876aa9e17855fa0ec7c7f.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\39eca44b5f7876aa9e17855fa0ec7c7f.exe"C:\Users\Admin\AppData\Local\Temp\39eca44b5f7876aa9e17855fa0ec7c7f.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\b9c73b2a\jusched.exe"C:\Program Files (x86)\b9c73b2a\jusched.exe"2⤵
- Executes dropped EXE
PID:2952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17B
MD589931a70501a3362b6823b53523f5a77
SHA188c7e199c462ed8cc3af0ba453512b5b1fdcfdb5
SHA256d30d9a0e64bc9f4a306617f087f30de6d57a5413793ab7bde13a299777a1b254
SHA5128fa7ab4824ae86f3f47b3718c11f79ef275dd0639396572eaeb1262ad9153ccf43c633a7b292e30c97370436a09f22fbcf817a802015650ffb1f84d2b83483bd
-
Filesize
208KB
MD51b3614797a8ce8d3e8bbf12396e8ccf6
SHA1a4a9577e31d58cf24c2a1f3cf49e373c84ec7a22
SHA256ed492753caa6981305e02777b60d4bd89f0ec8f85def3285092ca0d3c3d5df28
SHA512133b3b4778399f8c2c908b182af76720c8e328b0f333d59265fc25455d9d2d752e0f32ebbea3cbebeb5b6fca75a719f4264b7f3745dca03fbef26676aadf0a5f
-
Filesize
129KB
MD5ae61af961a18fd838b12cfd9310fc90f
SHA1203c25be674008b017d75963bfcac68f6c2045d6
SHA256e963f67bbe10da64ab05eba4e11604855c522d3ebbdcb6584e0746d876591c44
SHA512ab9c45bd3f6b867ba9c2a3fb60c7f78aed2d86518b57e976047885286d7d6d19d2132d1e4dfcaa3d1b2883bb9032d1b465038c9cbf6f4431d29f0544eaae0ea4
-
Filesize
93KB
MD50b690b7fb4412040eed6cc007205e1f3
SHA18feb9b26729cfb0b870736adc9a90f327867aab3
SHA256ff85a034ebeb8a51398d61b458b21beced3f9902176cf1e52f7a7b3969de006d
SHA512c650faf553e0afd17301a274fc00d739fefd81b4f6768c86d80b816e2994d09888478af599088b5a0ffe9d9bab7568151ddf3370c411c93adedfa174f3be111f