Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 22:53
Static task
static1
Behavioral task
behavioral1
Sample
7310a8c5a2e379d3f6147c4afd74dec0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7310a8c5a2e379d3f6147c4afd74dec0.exe
Resource
win10v2004-20231215-en
General
-
Target
7310a8c5a2e379d3f6147c4afd74dec0.exe
-
Size
62KB
-
MD5
7310a8c5a2e379d3f6147c4afd74dec0
-
SHA1
51afffe1e43756c62123e26a84e934a1c8b68a16
-
SHA256
28b75dc07bc2bccdf809324a3845325810bd7f0582e735b4632db5bde084d257
-
SHA512
2bb45c7ae670f6f6a686b8d93bc5f0cc02ab643a7a5feb39e728b768b72daff98cb70b74bd9b729266135207457a5db140ae438bbeb24ff7343570fa36a90ccb
-
SSDEEP
768:uhQ5Lbcp+MGOpbN5XdiAo1EXgBh04uXtle+WPi0CSlHhhItUYQzTGfL:8iLbcmUikXgPWD2BhoQk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3044 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 2228 7310a8c5a2e379d3f6147c4afd74dec0.exe 2228 7310a8c5a2e379d3f6147c4afd74dec0.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Java\jre-07\bin\jusched.exe 7310a8c5a2e379d3f6147c4afd74dec0.exe File created C:\Program Files (x86)\Java\jre-07\bin\UF 7310a8c5a2e379d3f6147c4afd74dec0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe 3044 jusched.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2228 wrote to memory of 3044 2228 7310a8c5a2e379d3f6147c4afd74dec0.exe 28 PID 2228 wrote to memory of 3044 2228 7310a8c5a2e379d3f6147c4afd74dec0.exe 28 PID 2228 wrote to memory of 3044 2228 7310a8c5a2e379d3f6147c4afd74dec0.exe 28 PID 2228 wrote to memory of 3044 2228 7310a8c5a2e379d3f6147c4afd74dec0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7310a8c5a2e379d3f6147c4afd74dec0.exe"C:\Users\Admin\AppData\Local\Temp\7310a8c5a2e379d3f6147c4afd74dec0.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Program Files (x86)\Java\jre-07\bin\jusched.exe"C:\Program Files (x86)\Java\jre-07\bin\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD57310a8c5a2e379d3f6147c4afd74dec0
SHA151afffe1e43756c62123e26a84e934a1c8b68a16
SHA25628b75dc07bc2bccdf809324a3845325810bd7f0582e735b4632db5bde084d257
SHA5122bb45c7ae670f6f6a686b8d93bc5f0cc02ab643a7a5feb39e728b768b72daff98cb70b74bd9b729266135207457a5db140ae438bbeb24ff7343570fa36a90ccb