Analysis
-
max time kernel
119s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22-07-2024 09:13
Behavioral task
behavioral1
Sample
8eeda9360fff8471dcfc0c8ac5c174d0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8eeda9360fff8471dcfc0c8ac5c174d0N.exe
Resource
win10v2004-20240709-en
General
-
Target
8eeda9360fff8471dcfc0c8ac5c174d0N.exe
-
Size
336KB
-
MD5
8eeda9360fff8471dcfc0c8ac5c174d0
-
SHA1
23cb2f23c9407a9389fe1bf403eee90e3da5da94
-
SHA256
867439de4e4bdc66ef2d38003ac5073f2b9084e4d33b96ad8d569a569ee2b425
-
SHA512
53cb77d491f4e1d48b4964e39755d8c46669dd210b94ddb5cf679134a091b95b60be0e75594f6eb0d6944699eb1874bb0cecddf2fa88ac8b1070899a8ec2108c
-
SSDEEP
6144:d3naj96sWrnc/ZKBgwioSPrzq1UUiGjoSiA5bmR:9naM8EBVSPvqJiGjoSi86R
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Control Panel\International\Geo\Nation 8eeda9360fff8471dcfc0c8ac5c174d0N.exe -
Executes dropped EXE 2 IoCs
pid Process 4880 jusched121.exe 2984 jusched121.exe -
resource yara_rule behavioral2/memory/4416-0-0x0000000000400000-0x00000000005B3000-memory.dmp upx behavioral2/files/0x000800000002344b-16.dat upx behavioral2/memory/4880-28-0x0000000000400000-0x00000000005B3000-memory.dmp upx behavioral2/memory/4416-32-0x0000000000400000-0x00000000005B3000-memory.dmp upx behavioral2/memory/2984-33-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/2984-36-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/2984-37-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/4880-41-0x0000000000400000-0x00000000005B3000-memory.dmp upx behavioral2/memory/2984-42-0x0000000000400000-0x0000000000409000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\849753894 = "C:\\Users\\Admin\\AppData\\Roaming\\jusched121.exe" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4880 set thread context of 0 4880 jusched121.exe PID 4880 set thread context of 2984 4880 jusched121.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2984 jusched121.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4416 8eeda9360fff8471dcfc0c8ac5c174d0N.exe 4880 jusched121.exe 2984 jusched121.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 4416 wrote to memory of 4956 4416 8eeda9360fff8471dcfc0c8ac5c174d0N.exe 87 PID 4416 wrote to memory of 4956 4416 8eeda9360fff8471dcfc0c8ac5c174d0N.exe 87 PID 4416 wrote to memory of 4956 4416 8eeda9360fff8471dcfc0c8ac5c174d0N.exe 87 PID 4956 wrote to memory of 768 4956 cmd.exe 90 PID 4956 wrote to memory of 768 4956 cmd.exe 90 PID 4956 wrote to memory of 768 4956 cmd.exe 90 PID 4416 wrote to memory of 4880 4416 8eeda9360fff8471dcfc0c8ac5c174d0N.exe 91 PID 4416 wrote to memory of 4880 4416 8eeda9360fff8471dcfc0c8ac5c174d0N.exe 91 PID 4416 wrote to memory of 4880 4416 8eeda9360fff8471dcfc0c8ac5c174d0N.exe 91 PID 4880 wrote to memory of 0 4880 jusched121.exe PID 4880 wrote to memory of 0 4880 jusched121.exe PID 4880 wrote to memory of 0 4880 jusched121.exe PID 4880 wrote to memory of 0 4880 jusched121.exe PID 4880 wrote to memory of 0 4880 jusched121.exe PID 4880 wrote to memory of 2984 4880 jusched121.exe 92 PID 4880 wrote to memory of 2984 4880 jusched121.exe 92 PID 4880 wrote to memory of 2984 4880 jusched121.exe 92 PID 4880 wrote to memory of 2984 4880 jusched121.exe 92 PID 4880 wrote to memory of 2984 4880 jusched121.exe 92 PID 4880 wrote to memory of 2984 4880 jusched121.exe 92 PID 4880 wrote to memory of 2984 4880 jusched121.exe 92 PID 4880 wrote to memory of 2984 4880 jusched121.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\8eeda9360fff8471dcfc0c8ac5c174d0N.exe"C:\Users\Admin\AppData\Local\Temp\8eeda9360fff8471dcfc0c8ac5c174d0N.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VQyqZ.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "849753894" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\jusched121.exe" /f3⤵
- Adds Run key to start application
PID:768
-
-
-
C:\Users\Admin\AppData\Roaming\jusched121.exe"C:\Users\Admin\AppData\Roaming\jusched121.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Roaming\jusched121.exeC:\Users\Admin\AppData\Roaming\jusched121.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2984
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
141B
MD5f29af156d2290b132c12fc7a52b915e7
SHA1de5dd6043c236ef9306ff49b7fbf262610f22f24
SHA256e9f28b9b7c75824f287698650968b9812525409ac5e5095b5d49247da3ffa99b
SHA512bd9fca2bb4c609cb6887b9d8532a51611a090b2234dbcd2f4c735e3040bf10128fd5e26fd9d9e4afe47518b12d66e26e35db7802ef00f15ebf232cf2a634e7aa
-
Filesize
336KB
MD5e68c17203c0964de93975550ed86d975
SHA167a81372be0990f1f607776ad022f4c3c390395a
SHA25665745ecc1c49bb73743b5766ab1120250a642db817b8815e66f2500595d25dc9
SHA5122bdc3e54d46f8b7e4c2cdb37328a594480de7fe239fb35257fa2ab9f7fd7cbfc76100484e6b710c416be13c74f11d5c6e8f58e216763056e185c58007d0bc2e0