Analysis
-
max time kernel
114s -
max time network
78s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 22:16
Behavioral task
behavioral1
Sample
1f6e720b9c0b1fc4ac17b08dcd7da970N.exe
Resource
win7-20240708-en
General
-
Target
1f6e720b9c0b1fc4ac17b08dcd7da970N.exe
-
Size
54KB
-
MD5
1f6e720b9c0b1fc4ac17b08dcd7da970
-
SHA1
08f9d138265301fef3ed3c30a10bbd60d09719df
-
SHA256
1e49819d007f2488deb5a660dc8f6a2e1e76bf3965b6522e2ecebf961ddf7cf0
-
SHA512
c15816f036f18887260c7a8b3fa2af0cf9b55d2e113cdb3b0afb22104e59281299fb8ed540f31cc8158efb9c94a1453249ef79c6ca35548e6341960f06278f5d
-
SSDEEP
1536:4dx1wT5ZpI4YG6kxmxZUUYzkQxQ8IXhEPz:4dbKbYRkxyHmSmPz
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2660 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 1892 1f6e720b9c0b1fc4ac17b08dcd7da970N.exe 1892 1f6e720b9c0b1fc4ac17b08dcd7da970N.exe -
resource yara_rule behavioral1/memory/1892-0-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/files/0x002b000000015c7b-5.dat upx behavioral1/memory/2660-15-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1892-12-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1892-11-0x0000000002930000-0x000000000298B000-memory.dmp upx behavioral1/memory/1892-16-0x0000000002930000-0x000000000298B000-memory.dmp upx behavioral1/memory/2660-17-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2660-23-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2660-24-0x0000000000400000-0x000000000045B000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\c2ff9deb\jusched.exe 1f6e720b9c0b1fc4ac17b08dcd7da970N.exe File created C:\Program Files (x86)\c2ff9deb\c2ff9deb 1f6e720b9c0b1fc4ac17b08dcd7da970N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Update23.job 1f6e720b9c0b1fc4ac17b08dcd7da970N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1f6e720b9c0b1fc4ac17b08dcd7da970N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1892 wrote to memory of 2660 1892 1f6e720b9c0b1fc4ac17b08dcd7da970N.exe 30 PID 1892 wrote to memory of 2660 1892 1f6e720b9c0b1fc4ac17b08dcd7da970N.exe 30 PID 1892 wrote to memory of 2660 1892 1f6e720b9c0b1fc4ac17b08dcd7da970N.exe 30 PID 1892 wrote to memory of 2660 1892 1f6e720b9c0b1fc4ac17b08dcd7da970N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f6e720b9c0b1fc4ac17b08dcd7da970N.exe"C:\Users\Admin\AppData\Local\Temp\1f6e720b9c0b1fc4ac17b08dcd7da970N.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Program Files (x86)\c2ff9deb\jusched.exe"C:\Program Files (x86)\c2ff9deb\jusched.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17B
MD54d77d6b250ffb567743b8dbcdad695b8
SHA1d5a8f98f9433f6d36c74df463cef3e2cf524462d
SHA2567ec7a3a23890c3592f5b762aecf11adbf8831fad11b8048aedfa7315d599c5f2
SHA5125655153049101fd67125d484c81f1ad30b44f36f00e3aabfe8d730a21661f4b394357b60da549289def4311b4cc7bd508d8fd6b8db254cd442b2152f8902bd71
-
Filesize
54KB
MD504382eadceadccae77c7bdd663d7be87
SHA1f97f556db24c495a5bf5095ab3ff4cb6381e9094
SHA2564d34996983f6cda7c7198dcb64cd1f278ba6f6748362cd60caf8cf4c8be6cc68
SHA5126cc21a233be11a4a6a53fc43314ee18d0bb5700a910e5699861027908a5ade2552ad640cdbeb2dca2b6b23b25261ec2994e9f6fff6151f622f54184df27883da