Analysis
-
max time kernel
150s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 20:07
Static task
static1
Behavioral task
behavioral1
Sample
2dea2ca6c3ea42cfdcfb3a250384e4ab661496a5b8dbbd194a648a401be1989e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2dea2ca6c3ea42cfdcfb3a250384e4ab661496a5b8dbbd194a648a401be1989e.exe
Resource
win10v2004-20240508-en
General
-
Target
2dea2ca6c3ea42cfdcfb3a250384e4ab661496a5b8dbbd194a648a401be1989e.exe
-
Size
2.5MB
-
MD5
e7fd7aecb774b78a8ef6f6753d1850f1
-
SHA1
da9db3340e65dd08378bb76acfabaea299b743fb
-
SHA256
2dea2ca6c3ea42cfdcfb3a250384e4ab661496a5b8dbbd194a648a401be1989e
-
SHA512
a33557e0d8fd3d7292e4dfae32df4f3098716ef42cfdd816508b7e4ab709277741a173a1d83e3747a7514f286debfdb5a96113ee5e945a454ce6844cb9ee2e35
-
SSDEEP
49152:pVKv5Bl8Xc+dOhXuDd93VuDXd+549ixt3LInYXAc/N5bzI2cZ9eJZ:kydlLF8Xs49St3LIYXAc/N5bzIFCJZ
Malware Config
Extracted
Protocol: ftp- Host:
ftp.byethost6.com - Port:
21 - Username:
b6_9261312 - Password:
741852
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
jusched.exepid process 2520 jusched.exe -
Loads dropped DLL 2 IoCs
Processes:
2dea2ca6c3ea42cfdcfb3a250384e4ab661496a5b8dbbd194a648a401be1989e.exepid process 2988 2dea2ca6c3ea42cfdcfb3a250384e4ab661496a5b8dbbd194a648a401be1989e.exe 2988 2dea2ca6c3ea42cfdcfb3a250384e4ab661496a5b8dbbd194a648a401be1989e.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
Processes:
2dea2ca6c3ea42cfdcfb3a250384e4ab661496a5b8dbbd194a648a401be1989e.exejusched.exepid process 2988 2dea2ca6c3ea42cfdcfb3a250384e4ab661496a5b8dbbd194a648a401be1989e.exe 2520 jusched.exe 2520 jusched.exe 2520 jusched.exe 2520 jusched.exe 2520 jusched.exe 2520 jusched.exe 2520 jusched.exe 2520 jusched.exe 2520 jusched.exe 2520 jusched.exe 2520 jusched.exe 2520 jusched.exe 2520 jusched.exe 2520 jusched.exe 2520 jusched.exe -
Drops file in Program Files directory 2 IoCs
Processes:
2dea2ca6c3ea42cfdcfb3a250384e4ab661496a5b8dbbd194a648a401be1989e.exedescription ioc process File created C:\Program Files (x86)\3f64e1d6\jusched.exe 2dea2ca6c3ea42cfdcfb3a250384e4ab661496a5b8dbbd194a648a401be1989e.exe File created C:\Program Files (x86)\3f64e1d6\3f64e1d6 2dea2ca6c3ea42cfdcfb3a250384e4ab661496a5b8dbbd194a648a401be1989e.exe -
Drops file in Windows directory 1 IoCs
Processes:
2dea2ca6c3ea42cfdcfb3a250384e4ab661496a5b8dbbd194a648a401be1989e.exedescription ioc process File created C:\Windows\Tasks\Update23.job 2dea2ca6c3ea42cfdcfb3a250384e4ab661496a5b8dbbd194a648a401be1989e.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
2dea2ca6c3ea42cfdcfb3a250384e4ab661496a5b8dbbd194a648a401be1989e.exejusched.exepid process 2988 2dea2ca6c3ea42cfdcfb3a250384e4ab661496a5b8dbbd194a648a401be1989e.exe 2520 jusched.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
2dea2ca6c3ea42cfdcfb3a250384e4ab661496a5b8dbbd194a648a401be1989e.exedescription pid process target process PID 2988 wrote to memory of 2520 2988 2dea2ca6c3ea42cfdcfb3a250384e4ab661496a5b8dbbd194a648a401be1989e.exe jusched.exe PID 2988 wrote to memory of 2520 2988 2dea2ca6c3ea42cfdcfb3a250384e4ab661496a5b8dbbd194a648a401be1989e.exe jusched.exe PID 2988 wrote to memory of 2520 2988 2dea2ca6c3ea42cfdcfb3a250384e4ab661496a5b8dbbd194a648a401be1989e.exe jusched.exe PID 2988 wrote to memory of 2520 2988 2dea2ca6c3ea42cfdcfb3a250384e4ab661496a5b8dbbd194a648a401be1989e.exe jusched.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2dea2ca6c3ea42cfdcfb3a250384e4ab661496a5b8dbbd194a648a401be1989e.exe"C:\Users\Admin\AppData\Local\Temp\2dea2ca6c3ea42cfdcfb3a250384e4ab661496a5b8dbbd194a648a401be1989e.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Program Files (x86)\3f64e1d6\jusched.exe"C:\Program Files (x86)\3f64e1d6\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2520
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17B
MD5713de2425165c8df1702f4fa73675b7c
SHA18776000c93a63c318fd1dc5765010ced1568ffa7
SHA25627969b723db5b2dd9c284c3351d884a535a92e6dadc44a425054fa76626a2343
SHA5129b5327edc09bca4846029bda05502e34711ee843fbeccf3328253fcd2f1b399601eb613350c49e1d06098831d7b3dc8f5b2e1d1651b44e070ba70c8fedf6cf44
-
Filesize
2.5MB
MD568f31f7a214faa23612d66a3e2f88a30
SHA186f48c101f8cddf7d25d7285887088c0f00c52fd
SHA2569045d78425a2e8aaffecfbb8b0001dbc19eb0189814091d6691968772959d3f2
SHA5127a897eb204319382043f76f42415bb068533e06b4ab108e0c6b398b7f46bf39f25a17567ec0cb42e65c306f2722575e18856caacd9a3a3d41a38c710ab79af51