Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 20:35 UTC

General

  • Target

    361c623b735946a7190c24889b9b4fda551fbe71d18cdf2df6737268a2ee0099.exe

  • Size

    210KB

  • MD5

    cdffa2ee90a5f0db5484e9f8cae72ed2

  • SHA1

    7d25a386c1ea36fd65ae1f38eb2e7c2589fde88f

  • SHA256

    361c623b735946a7190c24889b9b4fda551fbe71d18cdf2df6737268a2ee0099

  • SHA512

    760062142d6174c5fbb5bef6bc5bab31288d5688f24f4c8c36f0ddd7214c3fd84759c9565742cd30889bbaeee84a97c8370f0b2c6d8367d9aa2432decffd0698

  • SSDEEP

    3072:0VHgCc4xGvbwcU9KQ2BBAHmaPxzVoBb5Efxt:hCc4xGxWKQ2Bonxrxt

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    onthelinux
  • Password:
    741852abc

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\361c623b735946a7190c24889b9b4fda551fbe71d18cdf2df6737268a2ee0099.exe
    "C:\Users\Admin\AppData\Local\Temp\361c623b735946a7190c24889b9b4fda551fbe71d18cdf2df6737268a2ee0099.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2596
    • C:\Program Files (x86)\161f5bf9\jusched.exe
      "C:\Program Files (x86)\161f5bf9\jusched.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2644

Network

  • flag-us
    DNS
    ftp.byethost12.com
    jusched.exe
    Remote address:
    8.8.8.8:53
    Request
    ftp.byethost12.com
    IN A
    Response
    ftp.byethost12.com
    IN A
    185.27.134.11
  • flag-us
    DNS
    griptoloji.host-ed.net
    jusched.exe
    Remote address:
    8.8.8.8:53
    Request
    griptoloji.host-ed.net
    IN A
    Response
  • flag-us
    DNS
    ftp.tripod.com
    jusched.exe
    Remote address:
    8.8.8.8:53
    Request
    ftp.tripod.com
    IN A
    Response
    ftp.tripod.com
    IN A
    209.202.252.54
  • 185.27.134.11:21
    ftp.byethost12.com
    jusched.exe
    152 B
    3
  • 209.202.252.54:21
    ftp.tripod.com
    ftp
    jusched.exe
    303 B
    367 B
    6
    6
  • 185.27.134.11:21
    ftp.byethost12.com
    jusched.exe
    152 B
    3
  • 209.202.252.54:21
    ftp.tripod.com
    ftp
    jusched.exe
    303 B
    367 B
    6
    6
  • 8.8.8.8:53
    ftp.byethost12.com
    dns
    jusched.exe
    64 B
    80 B
    1
    1

    DNS Request

    ftp.byethost12.com

    DNS Response

    185.27.134.11

  • 8.8.8.8:53
    griptoloji.host-ed.net
    dns
    jusched.exe
    68 B
    124 B
    1
    1

    DNS Request

    griptoloji.host-ed.net

  • 8.8.8.8:53
    ftp.tripod.com
    dns
    jusched.exe
    60 B
    76 B
    1
    1

    DNS Request

    ftp.tripod.com

    DNS Response

    209.202.252.54

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\161f5bf9\161f5bf9

    Filesize

    17B

    MD5

    134c1d489094d6d3399f65b0e9aebc1f

    SHA1

    612a57fbe6ed3ab9c15b39451171d813314a28d5

    SHA256

    54f9150d1268f7b4b83dd9fc3ec32274bf749715a5806ff3ca5262f5427d6781

    SHA512

    b09bf60e4850d05261d81a124a647dd111f42480224eae8a3bd2f64736c38119953703f868ad34194a7ae6dad6aabff4081ba73df262bbe9f5327867c56a48ed

  • \Program Files (x86)\161f5bf9\jusched.exe

    Filesize

    210KB

    MD5

    e66f333675eb82979cf37b4a7ac60236

    SHA1

    88ee9e974b6b5695a02876084a39a998fa4cfeb9

    SHA256

    cae7c2fb21803aa93ff41cae9c0c30c3226e328bd9f63dd9936ddf16df9608d1

    SHA512

    0312a9f73c430fe8042f7d8146e5292a49147223f2176fe0268ceacc7bd497445e3632026fc1335b7672362696f5a307bb3fb6cfe4098e4e96f85ed90ee54dc1

  • memory/2596-0-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2596-7-0x0000000002540000-0x0000000002586000-memory.dmp

    Filesize

    280KB

  • memory/2596-13-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2644-14-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.