Analysis

  • max time kernel
    112s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    03-09-2024 05:34

General

  • Target

    41fc692d016b8ab749e38364a67897f316072604fac8b476b07ac4d2ca734cc8.exe

  • Size

    358KB

  • MD5

    e7609edb6ab6c4bef841d2375323c6d4

  • SHA1

    b2cda04fe3d6559348c626f58eb491385f177d51

  • SHA256

    41fc692d016b8ab749e38364a67897f316072604fac8b476b07ac4d2ca734cc8

  • SHA512

    5c1c09127f2620d71b3e4222d504103b99289e07bbd2d869943aa35050f2f3fb833421835e7507376b995806c2e38fecb1ad80f26636c06307c4c192ee9e353d

  • SSDEEP

    1536:EXscdri741fT/dQVJnsuv77P1Vg6u8jSZofgzd8MUp:EXpdr1f5QrnssP1Vg6eofgJ2

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.ueuo.com
  • Port:
    21
  • Username:
    googgle.ueuo.com
  • Password:
    741852

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.alizametal.com.tr
  • Port:
    21
  • Username:
    alizametal.com.tr
  • Password:
    hd611

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41fc692d016b8ab749e38364a67897f316072604fac8b476b07ac4d2ca734cc8.exe
    "C:\Users\Admin\AppData\Local\Temp\41fc692d016b8ab749e38364a67897f316072604fac8b476b07ac4d2ca734cc8.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1432
    • C:\Program Files (x86)\f16c1129\jusched.exe
      "C:\Program Files (x86)\f16c1129\jusched.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\f16c1129\f16c1129

    Filesize

    17B

    MD5

    bc13ad0f8d1727f36fde832e28bf44bb

    SHA1

    258533f23fa6fce5055b1247b9b4cbc8d13233cf

    SHA256

    aeccd3a7dee3061696d55f53b027aa15e4e8f3d66b970dc353d0532fee21aef6

    SHA512

    0389aff4333a77fde96a5439f414b9c71e7cd94948d591debf8e53199f5e1683d016803ba292b1382d288239b8df1ac4cfa81ab95899160a2f5a7ffd77553f3f

  • C:\Program Files (x86)\f16c1129\info_a

    Filesize

    12B

    MD5

    8ae53daee11debb22cbbc4bbbc7ecafd

    SHA1

    8ade7fb0712f12ff044fd3495d6d21e29c7016ae

    SHA256

    be7fc4868086b98f23c4d4f13024602e30173ea5bb2bb75fa64aaa2b679fe7e4

    SHA512

    fdc6d1ab7cee33ce07dc78354a5322c096320b63db2673a7a8ec4d53381bf70ffe2c05e6f081a03916685f389f4951cb726eb94b3166ffb7283cd85d69725c41

  • \Program Files (x86)\f16c1129\jusched.exe

    Filesize

    358KB

    MD5

    cce2d1ad2f334da927bbf672df24bde2

    SHA1

    f4df02557f9b3b55b8ae32d67b78c7de6c73fc6c

    SHA256

    eca65991c3427bb709c1f6081dd728f085f4e976a0fa91cce249b3fa33baad7f

    SHA512

    8e6f395396689e78889a877df3d11d89c0cf6a41badb01c6a00e5dfebd004fcb82656d61093ee3579a50e6bb430fc2d034b7ff4419dc206de82713f9ed673f61

  • memory/1432-0-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/1432-8-0x0000000002A90000-0x0000000002AFB000-memory.dmp

    Filesize

    428KB

  • memory/1432-13-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/2988-16-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB