Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 23:46
Static task
static1
Behavioral task
behavioral1
Sample
991a9fcdae3d21f8c932ac4bf26ecf44e62cd01c0e3d9eec8eb04bf9cfafbd50.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
991a9fcdae3d21f8c932ac4bf26ecf44e62cd01c0e3d9eec8eb04bf9cfafbd50.exe
Resource
win10v2004-20240802-en
General
-
Target
991a9fcdae3d21f8c932ac4bf26ecf44e62cd01c0e3d9eec8eb04bf9cfafbd50.exe
-
Size
46KB
-
MD5
560af6583ca1c3c5feae967edf0583db
-
SHA1
03818be480bfe3256a129d752ba4e44a1b568cb1
-
SHA256
991a9fcdae3d21f8c932ac4bf26ecf44e62cd01c0e3d9eec8eb04bf9cfafbd50
-
SHA512
d91bff104d2ba3b7ae0ff9dc11641cbefc167ecce3e8f8b55c16d2042f14d65e27627c94d7c889072ca4f4a8937f7e62009877e709a2e0ea09883d964a8a3ae3
-
SSDEEP
768:9qSqC8+N5ozQQqncwxWmNXMX3cX8tcXmcX8/XrX8/uUj5:9rqfzQQqamN88xjm7c7t
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation 991a9fcdae3d21f8c932ac4bf26ecf44e62cd01c0e3d9eec8eb04bf9cfafbd50.exe -
Executes dropped EXE 1 IoCs
pid Process 2016 jusched.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\61dadb3\jusched.exe 991a9fcdae3d21f8c932ac4bf26ecf44e62cd01c0e3d9eec8eb04bf9cfafbd50.exe File created C:\Program Files (x86)\61dadb3\61dadb3 991a9fcdae3d21f8c932ac4bf26ecf44e62cd01c0e3d9eec8eb04bf9cfafbd50.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 991a9fcdae3d21f8c932ac4bf26ecf44e62cd01c0e3d9eec8eb04bf9cfafbd50.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1752 wrote to memory of 2016 1752 991a9fcdae3d21f8c932ac4bf26ecf44e62cd01c0e3d9eec8eb04bf9cfafbd50.exe 91 PID 1752 wrote to memory of 2016 1752 991a9fcdae3d21f8c932ac4bf26ecf44e62cd01c0e3d9eec8eb04bf9cfafbd50.exe 91 PID 1752 wrote to memory of 2016 1752 991a9fcdae3d21f8c932ac4bf26ecf44e62cd01c0e3d9eec8eb04bf9cfafbd50.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\991a9fcdae3d21f8c932ac4bf26ecf44e62cd01c0e3d9eec8eb04bf9cfafbd50.exe"C:\Users\Admin\AppData\Local\Temp\991a9fcdae3d21f8c932ac4bf26ecf44e62cd01c0e3d9eec8eb04bf9cfafbd50.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Program Files (x86)\61dadb3\jusched.exe"C:\Program Files (x86)\61dadb3\jusched.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5f253efe302d32ab264a76e0ce65be769
SHA1768685ca582abd0af2fbb57ca37752aa98c9372b
SHA25649dca65f362fee401292ed7ada96f96295eab1e589c52e4e66bf4aedda715fdd
SHA5121990d20b462406bbadb22ba43f1ed9d0db6b250881d4ac89ad8cf6e43ca92b2fd31c3a15be1e6e149e42fdb46e58122c15bc7869a82c9490656c80df69fa77c4
-
Filesize
46KB
MD55482fb8e56a05e236f999a847db2cbad
SHA1d2958a5a4f6fecfa70bc03fcd043f834d65d432f
SHA2560ce6a6277cf681ea14f0ebddd1c7f15b4fca1e4a5e6e5df61543e13b283cc99a
SHA5122e8b971be0f726d0fbc353e557583523fc03ca83b235ee3eb98c1323bbe57a6e3da8168eba10c18375dbcd58f7fa6293c1c02803be73d3816e0666b05acd5154