Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 06:09
Static task
static1
Behavioral task
behavioral1
Sample
5a1fe1b68cee21a617b769a68bcdc9a0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5a1fe1b68cee21a617b769a68bcdc9a0N.exe
Resource
win10v2004-20240709-en
General
-
Target
5a1fe1b68cee21a617b769a68bcdc9a0N.exe
-
Size
226KB
-
MD5
5a1fe1b68cee21a617b769a68bcdc9a0
-
SHA1
a58098a58bd07565b26ecc471ad2d6a5f368834d
-
SHA256
20ab759531a45365e500196dd7abbad51aedbe73396310cc9687226f957222ed
-
SHA512
102b08358b8b9eabe1f3473d9f4f41c31d70c2c411aa0b3fc6165968db19893faec4d47cc291aa55b6d8f74daf6a5faf6c9cc64fcd57d99ab2717e056890d658
-
SSDEEP
3072:DVHgCc4xGvbwcU9KQ2BBAHmaPxtVo6b5E8Sy/O:KCc4xGxWKQ2Bonx1/O
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation 5a1fe1b68cee21a617b769a68bcdc9a0N.exe -
Executes dropped EXE 1 IoCs
pid Process 4468 jusched.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\d5c59803\d5c59803 5a1fe1b68cee21a617b769a68bcdc9a0N.exe File created C:\Program Files (x86)\d5c59803\jusched.exe 5a1fe1b68cee21a617b769a68bcdc9a0N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Update23.job 5a1fe1b68cee21a617b769a68bcdc9a0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2688 wrote to memory of 4468 2688 5a1fe1b68cee21a617b769a68bcdc9a0N.exe 93 PID 2688 wrote to memory of 4468 2688 5a1fe1b68cee21a617b769a68bcdc9a0N.exe 93 PID 2688 wrote to memory of 4468 2688 5a1fe1b68cee21a617b769a68bcdc9a0N.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a1fe1b68cee21a617b769a68bcdc9a0N.exe"C:\Users\Admin\AppData\Local\Temp\5a1fe1b68cee21a617b769a68bcdc9a0N.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Program Files (x86)\d5c59803\jusched.exe"C:\Program Files (x86)\d5c59803\jusched.exe"2⤵
- Executes dropped EXE
PID:4468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17B
MD5134c1d489094d6d3399f65b0e9aebc1f
SHA1612a57fbe6ed3ab9c15b39451171d813314a28d5
SHA25654f9150d1268f7b4b83dd9fc3ec32274bf749715a5806ff3ca5262f5427d6781
SHA512b09bf60e4850d05261d81a124a647dd111f42480224eae8a3bd2f64736c38119953703f868ad34194a7ae6dad6aabff4081ba73df262bbe9f5327867c56a48ed
-
Filesize
226KB
MD596198697211d61793e07ab14c89e7a3a
SHA1c813c4072291e474f49441c9d9e1b4cceb973d6a
SHA2564cd62fc5b2994d85e2e282fffb7bbb77f551862e4d4de7487cb9793553d3221a
SHA5124f5ec6a385bdc339d84b6f91c7bfe480620873ca94fa6889031c45d250f49f8c106b6661fad0b7685d379297cb30f0530c16d42f535c20dc84345395f6b3a13b