Analysis
-
max time kernel
111s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-09-2024 05:34
Static task
static1
Behavioral task
behavioral1
Sample
41fc692d016b8ab749e38364a67897f316072604fac8b476b07ac4d2ca734cc8.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
41fc692d016b8ab749e38364a67897f316072604fac8b476b07ac4d2ca734cc8.exe
Resource
win10v2004-20240802-en
General
-
Target
41fc692d016b8ab749e38364a67897f316072604fac8b476b07ac4d2ca734cc8.exe
-
Size
358KB
-
MD5
e7609edb6ab6c4bef841d2375323c6d4
-
SHA1
b2cda04fe3d6559348c626f58eb491385f177d51
-
SHA256
41fc692d016b8ab749e38364a67897f316072604fac8b476b07ac4d2ca734cc8
-
SHA512
5c1c09127f2620d71b3e4222d504103b99289e07bbd2d869943aa35050f2f3fb833421835e7507376b995806c2e38fecb1ad80f26636c06307c4c192ee9e353d
-
SSDEEP
1536:EXscdri741fT/dQVJnsuv77P1Vg6u8jSZofgzd8MUp:EXpdr1f5QrnssP1Vg6eofgJ2
Malware Config
Extracted
Protocol: ftp- Host:
ftp.ueuo.com - Port:
21 - Username:
googgle.ueuo.com - Password:
741852
Extracted
Protocol: ftp- Host:
ftp.alizametal.com.tr - Port:
21 - Username:
alizametal.com.tr - Password:
hd611
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation 41fc692d016b8ab749e38364a67897f316072604fac8b476b07ac4d2ca734cc8.exe -
Executes dropped EXE 1 IoCs
pid Process 5032 jusched.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\e149f91e\jusched.exe 41fc692d016b8ab749e38364a67897f316072604fac8b476b07ac4d2ca734cc8.exe File created C:\Program Files (x86)\e149f91e\e149f91e 41fc692d016b8ab749e38364a67897f316072604fac8b476b07ac4d2ca734cc8.exe File created C:\Program Files (x86)\e149f91e\info_a 41fc692d016b8ab749e38364a67897f316072604fac8b476b07ac4d2ca734cc8.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Update23.job 41fc692d016b8ab749e38364a67897f316072604fac8b476b07ac4d2ca734cc8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 41fc692d016b8ab749e38364a67897f316072604fac8b476b07ac4d2ca734cc8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4820 wrote to memory of 5032 4820 41fc692d016b8ab749e38364a67897f316072604fac8b476b07ac4d2ca734cc8.exe 90 PID 4820 wrote to memory of 5032 4820 41fc692d016b8ab749e38364a67897f316072604fac8b476b07ac4d2ca734cc8.exe 90 PID 4820 wrote to memory of 5032 4820 41fc692d016b8ab749e38364a67897f316072604fac8b476b07ac4d2ca734cc8.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\41fc692d016b8ab749e38364a67897f316072604fac8b476b07ac4d2ca734cc8.exe"C:\Users\Admin\AppData\Local\Temp\41fc692d016b8ab749e38364a67897f316072604fac8b476b07ac4d2ca734cc8.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Program Files (x86)\e149f91e\jusched.exe"C:\Program Files (x86)\e149f91e\jusched.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17B
MD5bc13ad0f8d1727f36fde832e28bf44bb
SHA1258533f23fa6fce5055b1247b9b4cbc8d13233cf
SHA256aeccd3a7dee3061696d55f53b027aa15e4e8f3d66b970dc353d0532fee21aef6
SHA5120389aff4333a77fde96a5439f414b9c71e7cd94948d591debf8e53199f5e1683d016803ba292b1382d288239b8df1ac4cfa81ab95899160a2f5a7ffd77553f3f
-
Filesize
12B
MD58ae53daee11debb22cbbc4bbbc7ecafd
SHA18ade7fb0712f12ff044fd3495d6d21e29c7016ae
SHA256be7fc4868086b98f23c4d4f13024602e30173ea5bb2bb75fa64aaa2b679fe7e4
SHA512fdc6d1ab7cee33ce07dc78354a5322c096320b63db2673a7a8ec4d53381bf70ffe2c05e6f081a03916685f389f4951cb726eb94b3166ffb7283cd85d69725c41
-
Filesize
358KB
MD559a8588d9f9065370ddb4858fd1f3a61
SHA11c1b58894d1a6bb6c34f0f22770288628d7a383e
SHA25697bd7c44f3be9e6362011a52a579c3a58a163785c1feef9f1a3cb6070f69b7fd
SHA51256564e38de88929608ae5d36219609028498f8a82fdb6c76c47e0498d7f6d50f4eca29707a55bcff219be3e11b62c0b1e81a0ae567c3fbc8f7aff4d24e7a29f0