Analysis
-
max time kernel
112s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
03-09-2024 05:34
Static task
static1
Behavioral task
behavioral1
Sample
41fc692d016b8ab749e38364a67897f316072604fac8b476b07ac4d2ca734cc8.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
41fc692d016b8ab749e38364a67897f316072604fac8b476b07ac4d2ca734cc8.exe
Resource
win10v2004-20240802-en
General
-
Target
41fc692d016b8ab749e38364a67897f316072604fac8b476b07ac4d2ca734cc8.exe
-
Size
358KB
-
MD5
e7609edb6ab6c4bef841d2375323c6d4
-
SHA1
b2cda04fe3d6559348c626f58eb491385f177d51
-
SHA256
41fc692d016b8ab749e38364a67897f316072604fac8b476b07ac4d2ca734cc8
-
SHA512
5c1c09127f2620d71b3e4222d504103b99289e07bbd2d869943aa35050f2f3fb833421835e7507376b995806c2e38fecb1ad80f26636c06307c4c192ee9e353d
-
SSDEEP
1536:EXscdri741fT/dQVJnsuv77P1Vg6u8jSZofgzd8MUp:EXpdr1f5QrnssP1Vg6eofgJ2
Malware Config
Extracted
Protocol: ftp- Host:
ftp.ueuo.com - Port:
21 - Username:
googgle.ueuo.com - Password:
741852
Extracted
Protocol: ftp- Host:
ftp.alizametal.com.tr - Port:
21 - Username:
alizametal.com.tr - Password:
hd611
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2988 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 1432 41fc692d016b8ab749e38364a67897f316072604fac8b476b07ac4d2ca734cc8.exe 1432 41fc692d016b8ab749e38364a67897f316072604fac8b476b07ac4d2ca734cc8.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\f16c1129\jusched.exe 41fc692d016b8ab749e38364a67897f316072604fac8b476b07ac4d2ca734cc8.exe File created C:\Program Files (x86)\f16c1129\f16c1129 41fc692d016b8ab749e38364a67897f316072604fac8b476b07ac4d2ca734cc8.exe File created C:\Program Files (x86)\f16c1129\info_a 41fc692d016b8ab749e38364a67897f316072604fac8b476b07ac4d2ca734cc8.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Update23.job 41fc692d016b8ab749e38364a67897f316072604fac8b476b07ac4d2ca734cc8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 41fc692d016b8ab749e38364a67897f316072604fac8b476b07ac4d2ca734cc8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1432 wrote to memory of 2988 1432 41fc692d016b8ab749e38364a67897f316072604fac8b476b07ac4d2ca734cc8.exe 30 PID 1432 wrote to memory of 2988 1432 41fc692d016b8ab749e38364a67897f316072604fac8b476b07ac4d2ca734cc8.exe 30 PID 1432 wrote to memory of 2988 1432 41fc692d016b8ab749e38364a67897f316072604fac8b476b07ac4d2ca734cc8.exe 30 PID 1432 wrote to memory of 2988 1432 41fc692d016b8ab749e38364a67897f316072604fac8b476b07ac4d2ca734cc8.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\41fc692d016b8ab749e38364a67897f316072604fac8b476b07ac4d2ca734cc8.exe"C:\Users\Admin\AppData\Local\Temp\41fc692d016b8ab749e38364a67897f316072604fac8b476b07ac4d2ca734cc8.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Program Files (x86)\f16c1129\jusched.exe"C:\Program Files (x86)\f16c1129\jusched.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17B
MD5bc13ad0f8d1727f36fde832e28bf44bb
SHA1258533f23fa6fce5055b1247b9b4cbc8d13233cf
SHA256aeccd3a7dee3061696d55f53b027aa15e4e8f3d66b970dc353d0532fee21aef6
SHA5120389aff4333a77fde96a5439f414b9c71e7cd94948d591debf8e53199f5e1683d016803ba292b1382d288239b8df1ac4cfa81ab95899160a2f5a7ffd77553f3f
-
Filesize
12B
MD58ae53daee11debb22cbbc4bbbc7ecafd
SHA18ade7fb0712f12ff044fd3495d6d21e29c7016ae
SHA256be7fc4868086b98f23c4d4f13024602e30173ea5bb2bb75fa64aaa2b679fe7e4
SHA512fdc6d1ab7cee33ce07dc78354a5322c096320b63db2673a7a8ec4d53381bf70ffe2c05e6f081a03916685f389f4951cb726eb94b3166ffb7283cd85d69725c41
-
Filesize
358KB
MD5cce2d1ad2f334da927bbf672df24bde2
SHA1f4df02557f9b3b55b8ae32d67b78c7de6c73fc6c
SHA256eca65991c3427bb709c1f6081dd728f085f4e976a0fa91cce249b3fa33baad7f
SHA5128e6f395396689e78889a877df3d11d89c0cf6a41badb01c6a00e5dfebd004fcb82656d61093ee3579a50e6bb430fc2d034b7ff4419dc206de82713f9ed673f61