Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-03-2024 02:03
Static task
static1
Behavioral task
behavioral1
Sample
c0d798a0fa325d1373269a5bf069e04801738fdcb689fc068669617b62d4bbef.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c0d798a0fa325d1373269a5bf069e04801738fdcb689fc068669617b62d4bbef.exe
Resource
win10v2004-20240226-en
General
-
Target
c0d798a0fa325d1373269a5bf069e04801738fdcb689fc068669617b62d4bbef.exe
-
Size
96KB
-
MD5
48b5d8ebc7103fb747d67b2a35d2bd6b
-
SHA1
2d9ea045643a8a3be512625b93b26bd4728f708b
-
SHA256
c0d798a0fa325d1373269a5bf069e04801738fdcb689fc068669617b62d4bbef
-
SHA512
6b7b743da13306dae5005fab5233edc0f82f7c25240af802a31074c1c937fd3493ad5f7f835b21618d43b81421a2408478432474f5fe9ae7a92d4c520856758a
-
SSDEEP
768:3/5inm+cd5rHemPXkqUEphjVuvios1rPr4adL0NqlJi+vBU6u7DPQ1TTGfGYc+p/:3RsvcdcQjosnvng6uQ1Jk
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
griptoloji - Password:
741852
Signatures
-
Detects executables built or packed with MPress PE compressor 4 IoCs
resource yara_rule behavioral1/memory/2660-0-0x0000000000400000-0x0000000000474000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x001300000001530d-5.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/2660-12-0x0000000000400000-0x0000000000474000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/532-14-0x0000000000400000-0x0000000000474000-memory.dmp INDICATOR_EXE_Packed_MPress -
Executes dropped EXE 1 IoCs
pid Process 532 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 2660 c0d798a0fa325d1373269a5bf069e04801738fdcb689fc068669617b62d4bbef.exe 2660 c0d798a0fa325d1373269a5bf069e04801738fdcb689fc068669617b62d4bbef.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Java\jre-09\bin\jusched.exe c0d798a0fa325d1373269a5bf069e04801738fdcb689fc068669617b62d4bbef.exe File opened for modification C:\Program Files (x86)\Java\jre-09\bin\jusched.exe c0d798a0fa325d1373269a5bf069e04801738fdcb689fc068669617b62d4bbef.exe File created C:\Program Files (x86)\Java\jre-09\bin\UF c0d798a0fa325d1373269a5bf069e04801738fdcb689fc068669617b62d4bbef.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe 532 jusched.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2660 wrote to memory of 532 2660 c0d798a0fa325d1373269a5bf069e04801738fdcb689fc068669617b62d4bbef.exe 28 PID 2660 wrote to memory of 532 2660 c0d798a0fa325d1373269a5bf069e04801738fdcb689fc068669617b62d4bbef.exe 28 PID 2660 wrote to memory of 532 2660 c0d798a0fa325d1373269a5bf069e04801738fdcb689fc068669617b62d4bbef.exe 28 PID 2660 wrote to memory of 532 2660 c0d798a0fa325d1373269a5bf069e04801738fdcb689fc068669617b62d4bbef.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0d798a0fa325d1373269a5bf069e04801738fdcb689fc068669617b62d4bbef.exe"C:\Users\Admin\AppData\Local\Temp\c0d798a0fa325d1373269a5bf069e04801738fdcb689fc068669617b62d4bbef.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD55f5b13c333c50219f6d913b1eb4d1103
SHA1ab9f32a94ef5ecfd31868b57889edd574f0b7ee2
SHA2566d5a3453ff16b017e705d6a220ed7409a2351d4702d59f7c099c35309c1968b1
SHA512641384decae129275fe75f50bf7127bf54674b73ba47a42c66698fa7d3f02238bc63fa7fb78843c8492f4fecebfeba64c2d2bf1ac2ae5404126bf6aa57cc5994