Analysis
-
max time kernel
144s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2024 08:28
Static task
static1
Behavioral task
behavioral1
Sample
405fd5ea785d5f9ccdae4807bf3beae6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
405fd5ea785d5f9ccdae4807bf3beae6.exe
Resource
win10v2004-20231215-en
General
-
Target
405fd5ea785d5f9ccdae4807bf3beae6.exe
-
Size
34KB
-
MD5
405fd5ea785d5f9ccdae4807bf3beae6
-
SHA1
14925ae1cb1f822ad940742e50766fec80920242
-
SHA256
08cce4c5d6331a2277352da22db218becbd6bb27cbb7189604b914669278310f
-
SHA512
6b28b6376640767f4230f20f18b6667f2774f49ee08ef0277903c2ef977a10e1cda5e451b2e33d14bbe1765026a683adf2e080b9c9171bc6344f427f827b6262
-
SSDEEP
768:cflivXrVKpVhKvtxwYHwVFoeAQEmucwU7:ylqrVKprVuQEG
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 405fd5ea785d5f9ccdae4807bf3beae6.exe -
Executes dropped EXE 1 IoCs
pid Process 4604 jusched.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\c8bb6016\jusched.exe 405fd5ea785d5f9ccdae4807bf3beae6.exe File created C:\Program Files (x86)\c8bb6016\c8bb6016 405fd5ea785d5f9ccdae4807bf3beae6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe 4604 jusched.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2804 wrote to memory of 4604 2804 405fd5ea785d5f9ccdae4807bf3beae6.exe 94 PID 2804 wrote to memory of 4604 2804 405fd5ea785d5f9ccdae4807bf3beae6.exe 94 PID 2804 wrote to memory of 4604 2804 405fd5ea785d5f9ccdae4807bf3beae6.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\405fd5ea785d5f9ccdae4807bf3beae6.exe"C:\Users\Admin\AppData\Local\Temp\405fd5ea785d5f9ccdae4807bf3beae6.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Program Files (x86)\c8bb6016\jusched.exe"C:\Program Files (x86)\c8bb6016\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5f253efe302d32ab264a76e0ce65be769
SHA1768685ca582abd0af2fbb57ca37752aa98c9372b
SHA25649dca65f362fee401292ed7ada96f96295eab1e589c52e4e66bf4aedda715fdd
SHA5121990d20b462406bbadb22ba43f1ed9d0db6b250881d4ac89ad8cf6e43ca92b2fd31c3a15be1e6e149e42fdb46e58122c15bc7869a82c9490656c80df69fa77c4
-
Filesize
34KB
MD59715ef31019936771a057560ad4c0d9d
SHA17d00131fa318f2dabc41567984497f1c1aed1f74
SHA256bf996e83dfad72e95d0fb550d96f4da2cfc6a91303a92d1a52c981f88ce2e6e3
SHA5124d36c6ec1c5c224cc76ea4aa99277be9b7b58fb628b4bba1d642505c749f7220cd93aedd627fe24521c9be952fbfb93bf5585c0ae519b963cfffb5fa353bef91