Analysis
-
max time kernel
151s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-06-2024 00:22
Static task
static1
Behavioral task
behavioral1
Sample
941955dbf8c27d4b0a6109093803ece9fff845ebc40edf2ac460f94a2bee7a34.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
941955dbf8c27d4b0a6109093803ece9fff845ebc40edf2ac460f94a2bee7a34.exe
Resource
win10v2004-20240226-en
General
-
Target
941955dbf8c27d4b0a6109093803ece9fff845ebc40edf2ac460f94a2bee7a34.exe
-
Size
258KB
-
MD5
1ac5868848186c21f686e1da41dbd8d7
-
SHA1
2580a12f170b77349e485e6b19525a60c94a28cc
-
SHA256
941955dbf8c27d4b0a6109093803ece9fff845ebc40edf2ac460f94a2bee7a34
-
SHA512
19c580f7efd1dc402e14a8280e949da39492b5fad0e14ebb2fe7ba8d59c4bc7c7115716c4d48e3709ff425d49076a0793be79bb419182a8c9388c5853bdd77bd
-
SSDEEP
6144:ZKiLscZW7UrL9DRzh7MGkno2btxvccVQafIW6:ZK4naUrLNJZ+1bTvcxxj
Malware Config
Signatures
-
Detects executables packed with VMProtect. 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023271-6.dat INDICATOR_EXE_Packed_VMProtect -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 941955dbf8c27d4b0a6109093803ece9fff845ebc40edf2ac460f94a2bee7a34.exe -
Executes dropped EXE 1 IoCs
pid Process 4908 jusched.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\6fc7d8ef\jusched.exe 941955dbf8c27d4b0a6109093803ece9fff845ebc40edf2ac460f94a2bee7a34.exe File created C:\Program Files (x86)\6fc7d8ef\6fc7d8ef 941955dbf8c27d4b0a6109093803ece9fff845ebc40edf2ac460f94a2bee7a34.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe 4908 jusched.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 372 wrote to memory of 4908 372 941955dbf8c27d4b0a6109093803ece9fff845ebc40edf2ac460f94a2bee7a34.exe 91 PID 372 wrote to memory of 4908 372 941955dbf8c27d4b0a6109093803ece9fff845ebc40edf2ac460f94a2bee7a34.exe 91 PID 372 wrote to memory of 4908 372 941955dbf8c27d4b0a6109093803ece9fff845ebc40edf2ac460f94a2bee7a34.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\941955dbf8c27d4b0a6109093803ece9fff845ebc40edf2ac460f94a2bee7a34.exe"C:\Users\Admin\AppData\Local\Temp\941955dbf8c27d4b0a6109093803ece9fff845ebc40edf2ac460f94a2bee7a34.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Program Files (x86)\6fc7d8ef\jusched.exe"C:\Program Files (x86)\6fc7d8ef\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1424 --field-trial-handle=2180,i,12780723798465539942,12010519452607841069,262144 --variations-seed-version /prefetch:81⤵PID:2556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5f253efe302d32ab264a76e0ce65be769
SHA1768685ca582abd0af2fbb57ca37752aa98c9372b
SHA25649dca65f362fee401292ed7ada96f96295eab1e589c52e4e66bf4aedda715fdd
SHA5121990d20b462406bbadb22ba43f1ed9d0db6b250881d4ac89ad8cf6e43ca92b2fd31c3a15be1e6e149e42fdb46e58122c15bc7869a82c9490656c80df69fa77c4
-
Filesize
258KB
MD5f209c6c91dfb69d21755db8dd9f16028
SHA10404e8b7d5aa3ab36c434cb85d2bb4455a284eae
SHA25689d1d1fdfd25808ceff2e603120b97a16a0300ccec6a34190043bee73cd75a34
SHA512babe2c72b92271fe0fd8fe32af4015583a7ffebf2513028b0c6d6a985464e3fb71d139a693c29b17b6d43eebdf8528f20943cc3c170af5b8401c0d09b5d217d3