Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
29-04-2024 02:36
Static task
static1
Behavioral task
behavioral1
Sample
d1c409e28026518d22db127f2c63a208db6fe271241bc21214511a3935b561b5.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
d1c409e28026518d22db127f2c63a208db6fe271241bc21214511a3935b561b5.exe
Resource
win10v2004-20240419-en
General
-
Target
d1c409e28026518d22db127f2c63a208db6fe271241bc21214511a3935b561b5.exe
-
Size
36KB
-
MD5
aed727cbc9903eda6852b963ac3e4702
-
SHA1
2055275640f96641fafb6aebd94ec0d85f240d70
-
SHA256
d1c409e28026518d22db127f2c63a208db6fe271241bc21214511a3935b561b5
-
SHA512
ab204a12a0961fbc2b423cd5c5f3202d7ad478d93c66d3ce7e876442e57125aea3a57715232a79bbc61e40a9e245f01f07eeab6ec1bb8f3d8954a75375ce2c91
-
SSDEEP
768:9qSqC8+N5ozQQRncwxWmNXMX3cX8wtgg/X/zCtgcgCEX8u/vSXrXrXrXrXrXyuwU:9rqfzQQRamN88Fr277777RwU
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation d1c409e28026518d22db127f2c63a208db6fe271241bc21214511a3935b561b5.exe -
Executes dropped EXE 1 IoCs
pid Process 2200 jusched.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\e41e0ae5\jusched.exe d1c409e28026518d22db127f2c63a208db6fe271241bc21214511a3935b561b5.exe File created C:\Program Files (x86)\e41e0ae5\e41e0ae5 d1c409e28026518d22db127f2c63a208db6fe271241bc21214511a3935b561b5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe 2200 jusched.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2036 wrote to memory of 2200 2036 d1c409e28026518d22db127f2c63a208db6fe271241bc21214511a3935b561b5.exe 86 PID 2036 wrote to memory of 2200 2036 d1c409e28026518d22db127f2c63a208db6fe271241bc21214511a3935b561b5.exe 86 PID 2036 wrote to memory of 2200 2036 d1c409e28026518d22db127f2c63a208db6fe271241bc21214511a3935b561b5.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1c409e28026518d22db127f2c63a208db6fe271241bc21214511a3935b561b5.exe"C:\Users\Admin\AppData\Local\Temp\d1c409e28026518d22db127f2c63a208db6fe271241bc21214511a3935b561b5.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Program Files (x86)\e41e0ae5\jusched.exe"C:\Program Files (x86)\e41e0ae5\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5f253efe302d32ab264a76e0ce65be769
SHA1768685ca582abd0af2fbb57ca37752aa98c9372b
SHA25649dca65f362fee401292ed7ada96f96295eab1e589c52e4e66bf4aedda715fdd
SHA5121990d20b462406bbadb22ba43f1ed9d0db6b250881d4ac89ad8cf6e43ca92b2fd31c3a15be1e6e149e42fdb46e58122c15bc7869a82c9490656c80df69fa77c4
-
Filesize
36KB
MD5d45ba1736e88b8a2e6942a2fe0bb8e59
SHA1aff3126264b575607c892bf0ce37985a83b17f47
SHA256bf8f711942ed21ef8484a47484d67304559406b3baca50b0ed2ace7ce699690e
SHA51254b0036c0e4486c00de37c0b297ca0ee58f0ea2fa2764eddd01f9672f8d2784c3127ffa25af9cd9124eb020927f1f486fe66f72cdda0fdbf2862ca1aaecb47a4