Analysis
-
max time kernel
149s -
max time network
75s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 04:07
Static task
static1
Behavioral task
behavioral1
Sample
cdc9214dd3b086a04dff9f1e497ed55f90dfc02ac4e6d8b076ea2a35dfd66cc9.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
cdc9214dd3b086a04dff9f1e497ed55f90dfc02ac4e6d8b076ea2a35dfd66cc9.exe
Resource
win10v2004-20240802-en
General
-
Target
cdc9214dd3b086a04dff9f1e497ed55f90dfc02ac4e6d8b076ea2a35dfd66cc9.exe
-
Size
46KB
-
MD5
bdbbf93e2c50334ac9c1b9aa5e4898a3
-
SHA1
9b60f8d0f90b6012787efc8516446fe1454cb275
-
SHA256
cdc9214dd3b086a04dff9f1e497ed55f90dfc02ac4e6d8b076ea2a35dfd66cc9
-
SHA512
ca050147ccc90df15716051b9b0d6cc7d92baadab4d53c76ca44c8e5c6ba5e01a1e636b99cdbfebbcbe44b6cf75a72a59a24eec7cc4a2bfdee3fcf2b5d8c239d
-
SSDEEP
768:zIP5WOMVs4PSV06ymNNC6S7Cm1n2OBGRIWNSE77NPQ1TTGfGYi6KT8:zI0OGrOy6NvSpMZVQ1J4KT8
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
griptoloji - Password:
741852
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1572 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 580 cdc9214dd3b086a04dff9f1e497ed55f90dfc02ac4e6d8b076ea2a35dfd66cc9.exe 580 cdc9214dd3b086a04dff9f1e497ed55f90dfc02ac4e6d8b076ea2a35dfd66cc9.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Java\jre-09\bin\jusched.exe cdc9214dd3b086a04dff9f1e497ed55f90dfc02ac4e6d8b076ea2a35dfd66cc9.exe File opened for modification C:\Program Files (x86)\Java\jre-09\bin\jusched.exe cdc9214dd3b086a04dff9f1e497ed55f90dfc02ac4e6d8b076ea2a35dfd66cc9.exe File created C:\Program Files (x86)\Java\jre-09\bin\UF cdc9214dd3b086a04dff9f1e497ed55f90dfc02ac4e6d8b076ea2a35dfd66cc9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdc9214dd3b086a04dff9f1e497ed55f90dfc02ac4e6d8b076ea2a35dfd66cc9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe 1572 jusched.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 580 wrote to memory of 1572 580 cdc9214dd3b086a04dff9f1e497ed55f90dfc02ac4e6d8b076ea2a35dfd66cc9.exe 29 PID 580 wrote to memory of 1572 580 cdc9214dd3b086a04dff9f1e497ed55f90dfc02ac4e6d8b076ea2a35dfd66cc9.exe 29 PID 580 wrote to memory of 1572 580 cdc9214dd3b086a04dff9f1e497ed55f90dfc02ac4e6d8b076ea2a35dfd66cc9.exe 29 PID 580 wrote to memory of 1572 580 cdc9214dd3b086a04dff9f1e497ed55f90dfc02ac4e6d8b076ea2a35dfd66cc9.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdc9214dd3b086a04dff9f1e497ed55f90dfc02ac4e6d8b076ea2a35dfd66cc9.exe"C:\Users\Admin\AppData\Local\Temp\cdc9214dd3b086a04dff9f1e497ed55f90dfc02ac4e6d8b076ea2a35dfd66cc9.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD5a4b860bd2296bd1868be048f9e38aaa1
SHA1438e0a0b366a94c2a984bbbe65ae73b5d809506c
SHA256b7ffb8b3b2e6d93b1d77d2323165c55410153f02807afe07d92c64d45f55343e
SHA51278ccc9d0f85d172ca0944ebfbb1bad11a5790abf8e5d6d03c72badfec924abba2b8e6305c0a3ea44097fe30ccc97634cf572e2dada381849b4ba158abf66d0a7