Analysis

  • max time kernel
    149s
  • max time network
    75s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    24/08/2024, 04:07

General

  • Target

    cdc9214dd3b086a04dff9f1e497ed55f90dfc02ac4e6d8b076ea2a35dfd66cc9.exe

  • Size

    46KB

  • MD5

    bdbbf93e2c50334ac9c1b9aa5e4898a3

  • SHA1

    9b60f8d0f90b6012787efc8516446fe1454cb275

  • SHA256

    cdc9214dd3b086a04dff9f1e497ed55f90dfc02ac4e6d8b076ea2a35dfd66cc9

  • SHA512

    ca050147ccc90df15716051b9b0d6cc7d92baadab4d53c76ca44c8e5c6ba5e01a1e636b99cdbfebbcbe44b6cf75a72a59a24eec7cc4a2bfdee3fcf2b5d8c239d

  • SSDEEP

    768:zIP5WOMVs4PSV06ymNNC6S7Cm1n2OBGRIWNSE77NPQ1TTGfGYi6KT8:zI0OGrOy6NvSpMZVQ1J4KT8

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    griptoloji
  • Password:
    741852

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cdc9214dd3b086a04dff9f1e497ed55f90dfc02ac4e6d8b076ea2a35dfd66cc9.exe
    "C:\Users\Admin\AppData\Local\Temp\cdc9214dd3b086a04dff9f1e497ed55f90dfc02ac4e6d8b076ea2a35dfd66cc9.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:580
    • C:\Program Files (x86)\Java\jre-09\bin\jusched.exe
      "C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1572

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Program Files (x86)\Java\jre-09\bin\jusched.exe

          Filesize

          46KB

          MD5

          a4b860bd2296bd1868be048f9e38aaa1

          SHA1

          438e0a0b366a94c2a984bbbe65ae73b5d809506c

          SHA256

          b7ffb8b3b2e6d93b1d77d2323165c55410153f02807afe07d92c64d45f55343e

          SHA512

          78ccc9d0f85d172ca0944ebfbb1bad11a5790abf8e5d6d03c72badfec924abba2b8e6305c0a3ea44097fe30ccc97634cf572e2dada381849b4ba158abf66d0a7

        • memory/580-0-0x0000000000400000-0x0000000000474000-memory.dmp

          Filesize

          464KB

        • memory/580-12-0x0000000000400000-0x0000000000474000-memory.dmp

          Filesize

          464KB

        • memory/1572-14-0x0000000000400000-0x0000000000474000-memory.dmp

          Filesize

          464KB

        • memory/1572-15-0x0000000000400000-0x0000000000474000-memory.dmp

          Filesize

          464KB

        • memory/1572-20-0x0000000000400000-0x0000000000474000-memory.dmp

          Filesize

          464KB

        • memory/1572-21-0x0000000000400000-0x0000000000474000-memory.dmp

          Filesize

          464KB