Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/06/2024, 21:23
Static task
static1
Behavioral task
behavioral1
Sample
42655948ed667537c31dd23827b9b2449c772afc334991328cf47ad2ba535063.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
42655948ed667537c31dd23827b9b2449c772afc334991328cf47ad2ba535063.exe
Resource
win10v2004-20240508-en
General
-
Target
42655948ed667537c31dd23827b9b2449c772afc334991328cf47ad2ba535063.exe
-
Size
59KB
-
MD5
35eeb6fd6ed7f519c21979d93c8205cd
-
SHA1
67613c9ad892ba93b6eed8f62f7364a516cf45ed
-
SHA256
42655948ed667537c31dd23827b9b2449c772afc334991328cf47ad2ba535063
-
SHA512
8c765812350efbf54caa3e512057ed0ead87bcf635ee398dfcade675dbdd9cc4b37126c7484cfdb408de64c0d3b7494e5d96048e54862bde7a2e2bc489d52a98
-
SSDEEP
768:9qSqC8+N5ozQQsncwxWmNXMX3cX8wtgtzpAXpX8/X/7CUrfbtSqkz:9rqfzQQsamN8835mv7CUroqkz
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 42655948ed667537c31dd23827b9b2449c772afc334991328cf47ad2ba535063.exe -
Executes dropped EXE 1 IoCs
pid Process 3832 jusched.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\6a4424b0\jusched.exe 42655948ed667537c31dd23827b9b2449c772afc334991328cf47ad2ba535063.exe File created C:\Program Files (x86)\6a4424b0\6a4424b0 42655948ed667537c31dd23827b9b2449c772afc334991328cf47ad2ba535063.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe 3832 jusched.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4904 wrote to memory of 3832 4904 42655948ed667537c31dd23827b9b2449c772afc334991328cf47ad2ba535063.exe 81 PID 4904 wrote to memory of 3832 4904 42655948ed667537c31dd23827b9b2449c772afc334991328cf47ad2ba535063.exe 81 PID 4904 wrote to memory of 3832 4904 42655948ed667537c31dd23827b9b2449c772afc334991328cf47ad2ba535063.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\42655948ed667537c31dd23827b9b2449c772afc334991328cf47ad2ba535063.exe"C:\Users\Admin\AppData\Local\Temp\42655948ed667537c31dd23827b9b2449c772afc334991328cf47ad2ba535063.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Program Files (x86)\6a4424b0\jusched.exe"C:\Program Files (x86)\6a4424b0\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5f253efe302d32ab264a76e0ce65be769
SHA1768685ca582abd0af2fbb57ca37752aa98c9372b
SHA25649dca65f362fee401292ed7ada96f96295eab1e589c52e4e66bf4aedda715fdd
SHA5121990d20b462406bbadb22ba43f1ed9d0db6b250881d4ac89ad8cf6e43ca92b2fd31c3a15be1e6e149e42fdb46e58122c15bc7869a82c9490656c80df69fa77c4
-
Filesize
59KB
MD5c88c34206ccf89347f97b9ffd8ae89d4
SHA11ee00f87069d8b81e63d7114edfdfb210321ec95
SHA256449d568913f8bd5edbc82892266e4eb39ea58eddd341bdb5c9a1be7c5106a1db
SHA5123cef71b597e7cff6d22573f2b9e9995328c5b073e0bda84c8d9ff9b55d13a888c196536410c3537fd2e386036de27cab009c4c3d7363b1432d33d8ee1973fb48