Analysis
-
max time kernel
119s -
max time network
75s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 21:41
Static task
static1
Behavioral task
behavioral1
Sample
faf858bfc52aa44484fdbb55f86c1680N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
faf858bfc52aa44484fdbb55f86c1680N.exe
Resource
win10v2004-20240802-en
General
-
Target
faf858bfc52aa44484fdbb55f86c1680N.exe
-
Size
46KB
-
MD5
faf858bfc52aa44484fdbb55f86c1680
-
SHA1
11a32bb41a88d7a4884725ef2d81feb3dfbb4a9b
-
SHA256
42ce41c1988f77bce494158ede8f6d7899302f03cb85b280809a147a86d83847
-
SHA512
937f6d4b2fdd61b7b01cf31e8d6d008febfcb0c085aaa59cdb9aff36284b374c69fcbf6e0f42846037f3fd2df915b72e95f9b101736659996a71709b73902a5a
-
SSDEEP
768:zIP5WOMVs4PSV06ymNNC6S7Cm1n2OBGRIWNSE77NPQ1TTGfGYz6KV:zI0OGrOy6NvSpMZVQ1JHKV
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
griptoloji - Password:
741852
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2176 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 2416 faf858bfc52aa44484fdbb55f86c1680N.exe 2416 faf858bfc52aa44484fdbb55f86c1680N.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Java\jre-09\bin\jusched.exe faf858bfc52aa44484fdbb55f86c1680N.exe File opened for modification C:\Program Files (x86)\Java\jre-09\bin\jusched.exe faf858bfc52aa44484fdbb55f86c1680N.exe File created C:\Program Files (x86)\Java\jre-09\bin\UF faf858bfc52aa44484fdbb55f86c1680N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language faf858bfc52aa44484fdbb55f86c1680N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe 2176 jusched.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2176 2416 faf858bfc52aa44484fdbb55f86c1680N.exe 31 PID 2416 wrote to memory of 2176 2416 faf858bfc52aa44484fdbb55f86c1680N.exe 31 PID 2416 wrote to memory of 2176 2416 faf858bfc52aa44484fdbb55f86c1680N.exe 31 PID 2416 wrote to memory of 2176 2416 faf858bfc52aa44484fdbb55f86c1680N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\faf858bfc52aa44484fdbb55f86c1680N.exe"C:\Users\Admin\AppData\Local\Temp\faf858bfc52aa44484fdbb55f86c1680N.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD5359e2b3a551f9511cbc50a47153b96d1
SHA1f719a318bc32b9f0e819164a5667629205debe7e
SHA2562993b1c3f2fb991d95134b43acc52926897b3d8b79f50d0bcb0bf2df76e50805
SHA51251480bc2372c58d40887b340aaf2ec70bf6bfd09eb65ff0af15930a69935aec3cf763b1d69b2e13ecfd3f520cec5be9ee3c715e2d3d7eceb9e72e14ed36ed676