Analysis
-
max time kernel
119s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 23:05
Static task
static1
Behavioral task
behavioral1
Sample
0ce56b8595353f190a99f781b4fd3360N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0ce56b8595353f190a99f781b4fd3360N.exe
Resource
win10v2004-20240709-en
General
-
Target
0ce56b8595353f190a99f781b4fd3360N.exe
-
Size
46KB
-
MD5
0ce56b8595353f190a99f781b4fd3360
-
SHA1
93274b71093ce2d6968a22829a05396ae3e8877e
-
SHA256
55ed8100889a7b68510cc61ebe58bb28b423ac311ef9ff0581e26d3414085f1b
-
SHA512
f764d77ee557ac9231019e6f8e2e9a8921f172297e1fab37cc5d865bcb67f75a8f318ebabc4d8e661831d8a619cb37a47c4b3fd2d5b7450db740b57a4adf01ed
-
SSDEEP
768:zIP5WOMVs4PSV06ymNNC6S7Cm1n2OBGRIWNSE77NPQ1TTGfGYi6KH:zI0OGrOy6NvSpMZVQ1J4KH
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
griptoloji - Password:
741852
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation 0ce56b8595353f190a99f781b4fd3360N.exe -
Executes dropped EXE 1 IoCs
pid Process 3248 jusched.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Java\jre-09\bin\jusched.exe 0ce56b8595353f190a99f781b4fd3360N.exe File opened for modification C:\Program Files (x86)\Java\jre-09\bin\jusched.exe 0ce56b8595353f190a99f781b4fd3360N.exe File created C:\Program Files (x86)\Java\jre-09\bin\UF 0ce56b8595353f190a99f781b4fd3360N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe 3248 jusched.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1556 wrote to memory of 3248 1556 0ce56b8595353f190a99f781b4fd3360N.exe 86 PID 1556 wrote to memory of 3248 1556 0ce56b8595353f190a99f781b4fd3360N.exe 86 PID 1556 wrote to memory of 3248 1556 0ce56b8595353f190a99f781b4fd3360N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ce56b8595353f190a99f781b4fd3360N.exe"C:\Users\Admin\AppData\Local\Temp\0ce56b8595353f190a99f781b4fd3360N.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3248
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD526becb5d1e9743f6ad3e21f120f128c0
SHA10d28e208f99df8a078cc3c99dbb74cac016d8bfb
SHA2562adf4e5a96f08869519a10db7753e1022b3df7608488de4ff26c8a412ecaaa6b
SHA5123b1c8436a47d51162ab27d3fb92caa444eb478f211e2f5c7b921097f591f20cf5c9bdee60c0a725d51151699852dc6751871c70566d369ae56dad87092cdc900