Analysis
-
max time kernel
120s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 22:45
Static task
static1
Behavioral task
behavioral1
Sample
100222d57aabf5e3656b867f66486e70N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
100222d57aabf5e3656b867f66486e70N.exe
Resource
win10v2004-20240709-en
General
-
Target
100222d57aabf5e3656b867f66486e70N.exe
-
Size
48KB
-
MD5
100222d57aabf5e3656b867f66486e70
-
SHA1
514969a46e4123800a03388af00e68643fd71153
-
SHA256
6d56aeb76f3857defa2e70c0f7cf65d47c40245aa335f36c21327c6256b523e9
-
SHA512
68b50d9926dbccd64f5c9e3d3d0eb0d2289dfd9256ac4f9e6cbdc542c7f7186954b835d569bb9cbb818ab34d491020a68fc6925956a63fe8c8e405a99bbde331
-
SSDEEP
768:kflivXrVKpVhKvtxwYHwVFoeAQFmucwUKzdlPPKXDbQra:alqrVKprVuQF7z7Pgaa
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation 100222d57aabf5e3656b867f66486e70N.exe -
Executes dropped EXE 1 IoCs
pid Process 4080 jusched.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\429840dc\jusched.exe 100222d57aabf5e3656b867f66486e70N.exe File created C:\Program Files (x86)\429840dc\429840dc 100222d57aabf5e3656b867f66486e70N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 100222d57aabf5e3656b867f66486e70N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe 4080 jusched.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3692 wrote to memory of 4080 3692 100222d57aabf5e3656b867f66486e70N.exe 92 PID 3692 wrote to memory of 4080 3692 100222d57aabf5e3656b867f66486e70N.exe 92 PID 3692 wrote to memory of 4080 3692 100222d57aabf5e3656b867f66486e70N.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\100222d57aabf5e3656b867f66486e70N.exe"C:\Users\Admin\AppData\Local\Temp\100222d57aabf5e3656b867f66486e70N.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Program Files (x86)\429840dc\jusched.exe"C:\Program Files (x86)\429840dc\jusched.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5f253efe302d32ab264a76e0ce65be769
SHA1768685ca582abd0af2fbb57ca37752aa98c9372b
SHA25649dca65f362fee401292ed7ada96f96295eab1e589c52e4e66bf4aedda715fdd
SHA5121990d20b462406bbadb22ba43f1ed9d0db6b250881d4ac89ad8cf6e43ca92b2fd31c3a15be1e6e149e42fdb46e58122c15bc7869a82c9490656c80df69fa77c4
-
Filesize
48KB
MD56d2d92ece964a00aec9298211863128f
SHA15642f917cb1f9e9ec16392e1c5f6dddaacb75079
SHA256788fc98e7c464b8a797005332408e0c3d14ffb74ac242a40596b731ff259b8cf
SHA512b7dadc90c3fb8165be703885845aa1f7992c2e6a16e62611b96b4541d2f0bbed228d5f63f0bd5f697fcb05514129999457707a68e0cf110f320011faf873cb07