Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/04/2024, 07:51
Static task
static1
Behavioral task
behavioral1
Sample
bd069e479df57440bfabe8349a3f32d6bd91addeea22ab03f48e1826a521b179.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bd069e479df57440bfabe8349a3f32d6bd91addeea22ab03f48e1826a521b179.exe
Resource
win10v2004-20240226-en
General
-
Target
bd069e479df57440bfabe8349a3f32d6bd91addeea22ab03f48e1826a521b179.exe
-
Size
3.4MB
-
MD5
5f04cf580b375ac90caf75930fd866e7
-
SHA1
f12c5c67b3c4df42b9c08cfd67b111c58f6f5df8
-
SHA256
bd069e479df57440bfabe8349a3f32d6bd91addeea22ab03f48e1826a521b179
-
SHA512
a6b428c8f8120e3aff6f9e0f6a77c5c3dcbaec0ab8995ef8ab3cb3977d8ee5f543bbe4fe8e982e2f9d3f11b243fa7756ac0a31e13a917e46189dc88ccfd502dd
-
SSDEEP
49152:kDpDi4lvfCPOjVqNUzAYzpIHBLCSp740Wc4:WpDNANMzpIcWSc4
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2880 netsh.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2468 attrib.exe -
Executes dropped EXE 2 IoCs
pid Process 2112 jusched.exe 2488 jusched.exe -
Loads dropped DLL 1 IoCs
pid Process 2660 cmd.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat jusched.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00e5000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 jusched.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F1BEEA6A-E618-495A-8269-162956B5203E} jusched.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ea-d1-1c-00-6d-56\WpadDecision = "0" jusched.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 jusched.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad jusched.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F1BEEA6A-E618-495A-8269-162956B5203E}\WpadDecisionReason = "1" jusched.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F1BEEA6A-E618-495A-8269-162956B5203E}\WpadDecisionTime = 506f83f31b8bda01 jusched.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings jusched.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections jusched.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 jusched.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings jusched.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" jusched.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F1BEEA6A-E618-495A-8269-162956B5203E}\WpadDecision = "0" jusched.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F1BEEA6A-E618-495A-8269-162956B5203E}\WpadNetworkName = "Network 3" jusched.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F1BEEA6A-E618-495A-8269-162956B5203E}\ea-d1-1c-00-6d-56 jusched.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ea-d1-1c-00-6d-56\WpadDecisionTime = 506f83f31b8bda01 jusched.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ea-d1-1c-00-6d-56 jusched.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ea-d1-1c-00-6d-56\WpadDecisionReason = "1" jusched.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 2928 wrote to memory of 3024 2928 bd069e479df57440bfabe8349a3f32d6bd91addeea22ab03f48e1826a521b179.exe 28 PID 2928 wrote to memory of 3024 2928 bd069e479df57440bfabe8349a3f32d6bd91addeea22ab03f48e1826a521b179.exe 28 PID 2928 wrote to memory of 3024 2928 bd069e479df57440bfabe8349a3f32d6bd91addeea22ab03f48e1826a521b179.exe 28 PID 2928 wrote to memory of 3024 2928 bd069e479df57440bfabe8349a3f32d6bd91addeea22ab03f48e1826a521b179.exe 28 PID 2928 wrote to memory of 3024 2928 bd069e479df57440bfabe8349a3f32d6bd91addeea22ab03f48e1826a521b179.exe 28 PID 2928 wrote to memory of 3024 2928 bd069e479df57440bfabe8349a3f32d6bd91addeea22ab03f48e1826a521b179.exe 28 PID 2928 wrote to memory of 3024 2928 bd069e479df57440bfabe8349a3f32d6bd91addeea22ab03f48e1826a521b179.exe 28 PID 3024 wrote to memory of 2660 3024 WScript.exe 29 PID 3024 wrote to memory of 2660 3024 WScript.exe 29 PID 3024 wrote to memory of 2660 3024 WScript.exe 29 PID 3024 wrote to memory of 2660 3024 WScript.exe 29 PID 3024 wrote to memory of 2660 3024 WScript.exe 29 PID 3024 wrote to memory of 2660 3024 WScript.exe 29 PID 3024 wrote to memory of 2660 3024 WScript.exe 29 PID 2660 wrote to memory of 2880 2660 cmd.exe 31 PID 2660 wrote to memory of 2880 2660 cmd.exe 31 PID 2660 wrote to memory of 2880 2660 cmd.exe 31 PID 2660 wrote to memory of 2880 2660 cmd.exe 31 PID 2660 wrote to memory of 2880 2660 cmd.exe 31 PID 2660 wrote to memory of 2880 2660 cmd.exe 31 PID 2660 wrote to memory of 2880 2660 cmd.exe 31 PID 2660 wrote to memory of 2112 2660 cmd.exe 32 PID 2660 wrote to memory of 2112 2660 cmd.exe 32 PID 2660 wrote to memory of 2112 2660 cmd.exe 32 PID 2660 wrote to memory of 2112 2660 cmd.exe 32 PID 2660 wrote to memory of 2112 2660 cmd.exe 32 PID 2660 wrote to memory of 2112 2660 cmd.exe 32 PID 2660 wrote to memory of 2112 2660 cmd.exe 32 PID 2660 wrote to memory of 2460 2660 cmd.exe 33 PID 2660 wrote to memory of 2460 2660 cmd.exe 33 PID 2660 wrote to memory of 2460 2660 cmd.exe 33 PID 2660 wrote to memory of 2460 2660 cmd.exe 33 PID 2660 wrote to memory of 2460 2660 cmd.exe 33 PID 2660 wrote to memory of 2460 2660 cmd.exe 33 PID 2660 wrote to memory of 2460 2660 cmd.exe 33 PID 2460 wrote to memory of 2740 2460 net.exe 34 PID 2460 wrote to memory of 2740 2460 net.exe 34 PID 2460 wrote to memory of 2740 2460 net.exe 34 PID 2460 wrote to memory of 2740 2460 net.exe 34 PID 2460 wrote to memory of 2740 2460 net.exe 34 PID 2460 wrote to memory of 2740 2460 net.exe 34 PID 2460 wrote to memory of 2740 2460 net.exe 34 PID 2660 wrote to memory of 2468 2660 cmd.exe 36 PID 2660 wrote to memory of 2468 2660 cmd.exe 36 PID 2660 wrote to memory of 2468 2660 cmd.exe 36 PID 2660 wrote to memory of 2468 2660 cmd.exe 36 PID 2660 wrote to memory of 2468 2660 cmd.exe 36 PID 2660 wrote to memory of 2468 2660 cmd.exe 36 PID 2660 wrote to memory of 2468 2660 cmd.exe 36 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2468 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd069e479df57440bfabe8349a3f32d6bd91addeea22ab03f48e1826a521b179.exe"C:\Users\Admin\AppData\Local\Temp\bd069e479df57440bfabe8349a3f32d6bd91addeea22ab03f48e1826a521b179.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\MSOCache\test.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\MSOCache\start.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode disable4⤵
- Modifies Windows Firewall
PID:2880
-
-
C:\MSOCache\jusched.exeC:\MSOCache\jusched.exe /I4⤵
- Executes dropped EXE
PID:2112
-
-
C:\Windows\SysWOW64\net.exenet start Taskmngr4⤵
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start Taskmngr5⤵PID:2740
-
-
-
C:\Windows\SysWOW64\attrib.exeattrib C:\Windows +s +h4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2468
-
-
-
-
C:\MSOCache\jusched.exeC:\MSOCache\jusched.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
591B
MD51bae7e838ce56ed78a4b5ac91969db36
SHA1d1a952bd113116f42a22b6f9354edb34614ba003
SHA256c513f527efe93c896ddc0a577ab1542b77a4e8b6317fffbff61ae2a9a80fa3de
SHA51293c4c461060e13bace63db6d69408e974be3c9b11c1cdfacdda88c37e571d13b12a69605b901ae0dbfce397ebdbc64a52a8470319918f111bc64c7f13d6e7896
-
Filesize
136B
MD502e6ddbc715dfd7ce1838c4b4b0520c8
SHA1beffad085107db83d28a1bf0cdd91ecafc8ba8c0
SHA2560311acfa1282599748d62918af38533250f0a39d0ac46ed9982c98d279e5c237
SHA51218730254e6289c75e682b11293e2095397d6d478993a6c08793cadc775c7ace0c6e281e031ddfcbc58047417b1cec35984f9788f2096bf81b92b812a25da3c5a
-
Filesize
126B
MD5f00621f0dc0f7f7469367cc2a2562bef
SHA178b65e1f8dafcfc262e309a2fc4e422bf3b15802
SHA2564c647088801454129c69674aa05916789dfb516163a22529722da226d835a48b
SHA512932c2fce2a5f7312fdbe748bf0fc55672fe4622bd2626793eae0e74bccc7fc4bcae268c38fa86a3d74abcf46e93b5356c0a5d6c76c361118aeab3532149e4f99
-
Filesize
377KB
MD5c4130bcfbec35b377b512ceb64221293
SHA1b05a8c3a48c5cc2fda027064f58c314f4dca03c2
SHA256df2edc9c52a0e5cde0222f6cbbbf39433ce02ce3653aaff58418b6d04141fd03
SHA512ff6234432127b33edb096440aac918fc69577e52536b26d43f30528853f02233ae653f8d8946fabd5f3f08eb3ba59004501f569f6ab0679f1cdb3683ed0d94f6