Analysis
-
max time kernel
150s -
max time network
84s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 23:46
Static task
static1
Behavioral task
behavioral1
Sample
991a9fcdae3d21f8c932ac4bf26ecf44e62cd01c0e3d9eec8eb04bf9cfafbd50.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
991a9fcdae3d21f8c932ac4bf26ecf44e62cd01c0e3d9eec8eb04bf9cfafbd50.exe
Resource
win10v2004-20240802-en
General
-
Target
991a9fcdae3d21f8c932ac4bf26ecf44e62cd01c0e3d9eec8eb04bf9cfafbd50.exe
-
Size
46KB
-
MD5
560af6583ca1c3c5feae967edf0583db
-
SHA1
03818be480bfe3256a129d752ba4e44a1b568cb1
-
SHA256
991a9fcdae3d21f8c932ac4bf26ecf44e62cd01c0e3d9eec8eb04bf9cfafbd50
-
SHA512
d91bff104d2ba3b7ae0ff9dc11641cbefc167ecce3e8f8b55c16d2042f14d65e27627c94d7c889072ca4f4a8937f7e62009877e709a2e0ea09883d964a8a3ae3
-
SSDEEP
768:9qSqC8+N5ozQQqncwxWmNXMX3cX8tcXmcX8/XrX8/uUj5:9rqfzQQqamN88xjm7c7t
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2808 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 2800 991a9fcdae3d21f8c932ac4bf26ecf44e62cd01c0e3d9eec8eb04bf9cfafbd50.exe 2800 991a9fcdae3d21f8c932ac4bf26ecf44e62cd01c0e3d9eec8eb04bf9cfafbd50.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\6f2e2448\jusched.exe 991a9fcdae3d21f8c932ac4bf26ecf44e62cd01c0e3d9eec8eb04bf9cfafbd50.exe File created C:\Program Files (x86)\6f2e2448\6f2e2448 991a9fcdae3d21f8c932ac4bf26ecf44e62cd01c0e3d9eec8eb04bf9cfafbd50.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 991a9fcdae3d21f8c932ac4bf26ecf44e62cd01c0e3d9eec8eb04bf9cfafbd50.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe 2808 jusched.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2800 wrote to memory of 2808 2800 991a9fcdae3d21f8c932ac4bf26ecf44e62cd01c0e3d9eec8eb04bf9cfafbd50.exe 30 PID 2800 wrote to memory of 2808 2800 991a9fcdae3d21f8c932ac4bf26ecf44e62cd01c0e3d9eec8eb04bf9cfafbd50.exe 30 PID 2800 wrote to memory of 2808 2800 991a9fcdae3d21f8c932ac4bf26ecf44e62cd01c0e3d9eec8eb04bf9cfafbd50.exe 30 PID 2800 wrote to memory of 2808 2800 991a9fcdae3d21f8c932ac4bf26ecf44e62cd01c0e3d9eec8eb04bf9cfafbd50.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\991a9fcdae3d21f8c932ac4bf26ecf44e62cd01c0e3d9eec8eb04bf9cfafbd50.exe"C:\Users\Admin\AppData\Local\Temp\991a9fcdae3d21f8c932ac4bf26ecf44e62cd01c0e3d9eec8eb04bf9cfafbd50.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Program Files (x86)\6f2e2448\jusched.exe"C:\Program Files (x86)\6f2e2448\jusched.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5f253efe302d32ab264a76e0ce65be769
SHA1768685ca582abd0af2fbb57ca37752aa98c9372b
SHA25649dca65f362fee401292ed7ada96f96295eab1e589c52e4e66bf4aedda715fdd
SHA5121990d20b462406bbadb22ba43f1ed9d0db6b250881d4ac89ad8cf6e43ca92b2fd31c3a15be1e6e149e42fdb46e58122c15bc7869a82c9490656c80df69fa77c4
-
Filesize
46KB
MD5a556d1741e36d3876c9fb1b462881863
SHA10d6719f2db3b77a91e4f6d45ab886b258e45197f
SHA25681a4301d14f4799d0effe7ee72f6cdd76296737ce40491ac463bd03d14a92e83
SHA51220027147262ed86a441c8c1ea24f985f5ed44c8718fdb79bcd0df4309ee4f80b98aabca813140f0a25183883f6ea685c55ea24da4c73336d9f7d7f14173518fb