Analysis
-
max time kernel
119s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2024 17:56
Static task
static1
Behavioral task
behavioral1
Sample
65aa2e6428ea172fef0d60efe208e13d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
65aa2e6428ea172fef0d60efe208e13d.exe
Resource
win10v2004-20231215-en
General
-
Target
65aa2e6428ea172fef0d60efe208e13d.exe
-
Size
209KB
-
MD5
65aa2e6428ea172fef0d60efe208e13d
-
SHA1
a6ddb21e3c9e6882fb268b740d0f1a1f21da7d7c
-
SHA256
2f8a9ca3546de242f4680dca3f5a5603af1ea290b762fb550f4866004a472746
-
SHA512
9da3c729fd7f27242b08fd56c38a82f9cb3317b18eef340d3ea6c0b7c1b1a391983cd4b1ea244461c672425e317e24990066889e775744529fcf26eabc6733f6
-
SSDEEP
1536:SNSXbc74YTOnlNSUL09atT0mBBA7aKSvIYFwAfdvo6QO5M:SEo75OnPSI09qgmBBAGKSvwovo692
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 65aa2e6428ea172fef0d60efe208e13d.exe -
Executes dropped EXE 1 IoCs
pid Process 4988 jusched.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\e927bd3d\jusched.exe 65aa2e6428ea172fef0d60efe208e13d.exe File created C:\Program Files (x86)\e927bd3d\e927bd3d 65aa2e6428ea172fef0d60efe208e13d.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Update23.job 65aa2e6428ea172fef0d60efe208e13d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1796 wrote to memory of 4988 1796 65aa2e6428ea172fef0d60efe208e13d.exe 93 PID 1796 wrote to memory of 4988 1796 65aa2e6428ea172fef0d60efe208e13d.exe 93 PID 1796 wrote to memory of 4988 1796 65aa2e6428ea172fef0d60efe208e13d.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\65aa2e6428ea172fef0d60efe208e13d.exe"C:\Users\Admin\AppData\Local\Temp\65aa2e6428ea172fef0d60efe208e13d.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Program Files (x86)\e927bd3d\jusched.exe"C:\Program Files (x86)\e927bd3d\jusched.exe"2⤵
- Executes dropped EXE
PID:4988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17B
MD53330ebaaa7e9f4630f4ad4c156be59d8
SHA140375cf8e68671e0100e725de5cd5c6657b9f722
SHA2562c8451d5dca9e68ec3af7f318c5d874fbdfea9e89e7b5f9922b4dbd65f027e15
SHA512b7631f9685bac9f81aa6bf53afd839910773e108989bbb79ba39cafabbe6b6994ed2fde44911c9f7f24b45c9745d6e80cd9f01975bfb765561df4881f7dad696
-
Filesize
209KB
MD5f83833ceb30ba9f0179d29a274c07c2b
SHA14c92860b921233b1d19e196270eb8c9d217d4556
SHA256d87de87275d65253466547c6d3a93c13ae43e1eb1828a7b1d07caed65a285dbd
SHA512733b8362cd56a1cf18acd734bb68ed4018035f3efb69745745098eb4cd3e920a747124c77e2549ac79bbb330fd782f8ca7c857baf003dab0224c306897b4c4b0