Analysis

  • max time kernel
    150s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 20:07

General

  • Target

    2dea2ca6c3ea42cfdcfb3a250384e4ab661496a5b8dbbd194a648a401be1989e.exe

  • Size

    2.5MB

  • MD5

    e7fd7aecb774b78a8ef6f6753d1850f1

  • SHA1

    da9db3340e65dd08378bb76acfabaea299b743fb

  • SHA256

    2dea2ca6c3ea42cfdcfb3a250384e4ab661496a5b8dbbd194a648a401be1989e

  • SHA512

    a33557e0d8fd3d7292e4dfae32df4f3098716ef42cfdd816508b7e4ab709277741a173a1d83e3747a7514f286debfdb5a96113ee5e945a454ce6844cb9ee2e35

  • SSDEEP

    49152:pVKv5Bl8Xc+dOhXuDd93VuDXd+549ixt3LInYXAc/N5bzI2cZ9eJZ:kydlLF8Xs49St3LIYXAc/N5bzIFCJZ

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.byethost6.com
  • Port:
    21
  • Username:
    b6_9261312
  • Password:
    741852

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    onthelinux
  • Password:
    741852abc

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2dea2ca6c3ea42cfdcfb3a250384e4ab661496a5b8dbbd194a648a401be1989e.exe
    "C:\Users\Admin\AppData\Local\Temp\2dea2ca6c3ea42cfdcfb3a250384e4ab661496a5b8dbbd194a648a401be1989e.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2988
    • C:\Program Files (x86)\3f64e1d6\jusched.exe
      "C:\Program Files (x86)\3f64e1d6\jusched.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetWindowsHookEx
      PID:2520

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\3f64e1d6\3f64e1d6

    Filesize

    17B

    MD5

    713de2425165c8df1702f4fa73675b7c

    SHA1

    8776000c93a63c318fd1dc5765010ced1568ffa7

    SHA256

    27969b723db5b2dd9c284c3351d884a535a92e6dadc44a425054fa76626a2343

    SHA512

    9b5327edc09bca4846029bda05502e34711ee843fbeccf3328253fcd2f1b399601eb613350c49e1d06098831d7b3dc8f5b2e1d1651b44e070ba70c8fedf6cf44

  • \Program Files (x86)\3f64e1d6\jusched.exe

    Filesize

    2.5MB

    MD5

    68f31f7a214faa23612d66a3e2f88a30

    SHA1

    86f48c101f8cddf7d25d7285887088c0f00c52fd

    SHA256

    9045d78425a2e8aaffecfbb8b0001dbc19eb0189814091d6691968772959d3f2

    SHA512

    7a897eb204319382043f76f42415bb068533e06b4ab108e0c6b398b7f46bf39f25a17567ec0cb42e65c306f2722575e18856caacd9a3a3d41a38c710ab79af51

  • memory/2520-22-0x0000000000400000-0x0000000000E06000-memory.dmp

    Filesize

    10.0MB

  • memory/2520-30-0x0000000000400000-0x0000000000E06000-memory.dmp

    Filesize

    10.0MB

  • memory/2520-34-0x0000000000400000-0x0000000000E06000-memory.dmp

    Filesize

    10.0MB

  • memory/2520-18-0x0000000000400000-0x0000000000E06000-memory.dmp

    Filesize

    10.0MB

  • memory/2520-33-0x0000000000400000-0x0000000000E06000-memory.dmp

    Filesize

    10.0MB

  • memory/2520-19-0x0000000000400000-0x0000000000E06000-memory.dmp

    Filesize

    10.0MB

  • memory/2520-20-0x0000000000400000-0x0000000000E06000-memory.dmp

    Filesize

    10.0MB

  • memory/2520-32-0x0000000000400000-0x0000000000E06000-memory.dmp

    Filesize

    10.0MB

  • memory/2520-31-0x0000000000400000-0x0000000000E06000-memory.dmp

    Filesize

    10.0MB

  • memory/2520-23-0x0000000000400000-0x0000000000E06000-memory.dmp

    Filesize

    10.0MB

  • memory/2520-24-0x0000000000400000-0x0000000000E06000-memory.dmp

    Filesize

    10.0MB

  • memory/2520-29-0x0000000000400000-0x0000000000E06000-memory.dmp

    Filesize

    10.0MB

  • memory/2520-26-0x0000000000400000-0x0000000000E06000-memory.dmp

    Filesize

    10.0MB

  • memory/2520-27-0x0000000000400000-0x0000000000E06000-memory.dmp

    Filesize

    10.0MB

  • memory/2520-28-0x0000000000400000-0x0000000000E06000-memory.dmp

    Filesize

    10.0MB

  • memory/2988-1-0x000000007EBD0000-0x000000007EFA1000-memory.dmp

    Filesize

    3.8MB

  • memory/2988-14-0x000000007EBD0000-0x000000007EFA1000-memory.dmp

    Filesize

    3.8MB

  • memory/2988-0-0x0000000000400000-0x0000000000E06000-memory.dmp

    Filesize

    10.0MB

  • memory/2988-21-0x0000000003D10000-0x0000000004716000-memory.dmp

    Filesize

    10.0MB

  • memory/2988-13-0x0000000000400000-0x0000000000E06000-memory.dmp

    Filesize

    10.0MB

  • memory/2988-17-0x0000000003D10000-0x0000000004716000-memory.dmp

    Filesize

    10.0MB