Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/04/2024, 23:35
Static task
static1
Behavioral task
behavioral1
Sample
8398265a1afccb4b84ddac6f479e4d664d04470149aaffcec2fde3b673a13c77.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8398265a1afccb4b84ddac6f479e4d664d04470149aaffcec2fde3b673a13c77.exe
Resource
win10v2004-20240226-en
General
-
Target
8398265a1afccb4b84ddac6f479e4d664d04470149aaffcec2fde3b673a13c77.exe
-
Size
263KB
-
MD5
27f6c7b9f5219fecf10e3076ef4d79ac
-
SHA1
eab258f5c048272219e0806c9930c15c73ee9d22
-
SHA256
8398265a1afccb4b84ddac6f479e4d664d04470149aaffcec2fde3b673a13c77
-
SHA512
4eaa055e96313ce532f917d05492d28e9ef65ee749ef52896176c011b73c49d291709acbd9692d9437647c7120148d97208311bf438b0f55668d5632520852ff
-
SSDEEP
3072:BXpdr1f5QrnssP1Vg6eofg/7+upI8GpFeGMkTZ5:jjRQJ9m6ez+MWeGBTZ5
Malware Config
Extracted
Protocol: ftp- Host:
ftp.ueuo.com - Port:
21 - Username:
googgle.ueuo.com - Password:
741852
Extracted
Protocol: ftp- Host:
ftp.yesimcopy.com - Port:
21 - Username:
yesimcopy1 - Password:
825cyf
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation 8398265a1afccb4b84ddac6f479e4d664d04470149aaffcec2fde3b673a13c77.exe -
Executes dropped EXE 1 IoCs
pid Process 4628 jusched.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\9b42e60d\jusched.exe 8398265a1afccb4b84ddac6f479e4d664d04470149aaffcec2fde3b673a13c77.exe File created C:\Program Files (x86)\9b42e60d\9b42e60d 8398265a1afccb4b84ddac6f479e4d664d04470149aaffcec2fde3b673a13c77.exe File created C:\Program Files (x86)\9b42e60d\info_a 8398265a1afccb4b84ddac6f479e4d664d04470149aaffcec2fde3b673a13c77.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Update23.job 8398265a1afccb4b84ddac6f479e4d664d04470149aaffcec2fde3b673a13c77.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1356 wrote to memory of 4628 1356 8398265a1afccb4b84ddac6f479e4d664d04470149aaffcec2fde3b673a13c77.exe 91 PID 1356 wrote to memory of 4628 1356 8398265a1afccb4b84ddac6f479e4d664d04470149aaffcec2fde3b673a13c77.exe 91 PID 1356 wrote to memory of 4628 1356 8398265a1afccb4b84ddac6f479e4d664d04470149aaffcec2fde3b673a13c77.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\8398265a1afccb4b84ddac6f479e4d664d04470149aaffcec2fde3b673a13c77.exe"C:\Users\Admin\AppData\Local\Temp\8398265a1afccb4b84ddac6f479e4d664d04470149aaffcec2fde3b673a13c77.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Program Files (x86)\9b42e60d\jusched.exe"C:\Program Files (x86)\9b42e60d\jusched.exe"2⤵
- Executes dropped EXE
PID:4628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17B
MD5bc13ad0f8d1727f36fde832e28bf44bb
SHA1258533f23fa6fce5055b1247b9b4cbc8d13233cf
SHA256aeccd3a7dee3061696d55f53b027aa15e4e8f3d66b970dc353d0532fee21aef6
SHA5120389aff4333a77fde96a5439f414b9c71e7cd94948d591debf8e53199f5e1683d016803ba292b1382d288239b8df1ac4cfa81ab95899160a2f5a7ffd77553f3f
-
Filesize
12B
MD54b538e1d56035d1212eecf87e7c574ff
SHA144add33b85e1b65615843dbac47dd72052534b21
SHA256d4529887b9636a43eedd865e47deeb4310c50e8f3d140c22ea918b214cae82e6
SHA512572d10e2541f55d68979374d3cc886369c5efdf25aa4b02229ba14d31a4bafeaf18d0f27c7b0083517be90466bed75b60d046aa698956ff81b3ae9ea2f756728
-
Filesize
263KB
MD571211812337e82551a853037b0bac9e0
SHA1c2ffc8a397d833962d82db54ffded3a9dd801c50
SHA25694dab76458b74f73159cadd3678a803fd5be880828a30b476e5fd12d21e42145
SHA512df840d451170a6e75278ebb6cfa543ce324f424ef70fedff9cbaa88ad8ba8287ee97f365b164a2fddea9239c160a3c8a1e9a132a08d957758ab0aa6c7385e33c