Analysis
-
max time kernel
119s -
max time network
92s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/09/2024, 06:46
Static task
static1
Behavioral task
behavioral1
Sample
a17f66b5cdf94e558195b7c163e12640N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a17f66b5cdf94e558195b7c163e12640N.exe
Resource
win10v2004-20240802-en
General
-
Target
a17f66b5cdf94e558195b7c163e12640N.exe
-
Size
96KB
-
MD5
a17f66b5cdf94e558195b7c163e12640
-
SHA1
ef3943864796d208aff8e3d57bfe2085143ab123
-
SHA256
7ff297e9e64f6c203633d5052ad3e6c58a1662ddbbee35c7c6c3a79f5659dd78
-
SHA512
8e627b1e0eedce93eed9ef11f7ed6c5a060271473826d25fe05a252d9c50e128f308bdde9bcf899f5b13fd54f421cb463566a74bb62f677a97975c73d44e0239
-
SSDEEP
768:p/5inm+cd5rHemPXkqUEphjVuvios1rPr4adL0NqlJi+vBU6u7DPQ1TTGfGYc+pX:pRsvcdcQjosnvng6uQ1JO
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
griptoloji - Password:
741852
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation a17f66b5cdf94e558195b7c163e12640N.exe -
Executes dropped EXE 1 IoCs
pid Process 1060 jusched.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Java\jre-09\bin\jusched.exe a17f66b5cdf94e558195b7c163e12640N.exe File opened for modification C:\Program Files (x86)\Java\jre-09\bin\jusched.exe a17f66b5cdf94e558195b7c163e12640N.exe File created C:\Program Files (x86)\Java\jre-09\bin\UF a17f66b5cdf94e558195b7c163e12640N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a17f66b5cdf94e558195b7c163e12640N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe 1060 jusched.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3728 wrote to memory of 1060 3728 a17f66b5cdf94e558195b7c163e12640N.exe 89 PID 3728 wrote to memory of 1060 3728 a17f66b5cdf94e558195b7c163e12640N.exe 89 PID 3728 wrote to memory of 1060 3728 a17f66b5cdf94e558195b7c163e12640N.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\a17f66b5cdf94e558195b7c163e12640N.exe"C:\Users\Admin\AppData\Local\Temp\a17f66b5cdf94e558195b7c163e12640N.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5ac0aedb58552326d11f88c2034f830eb
SHA191b157fd48d40ee396358d32922faaf7c84830c4
SHA256aa3c25ce5043ca12037b91b90286ddc00c392c48a10150f619966897d561bc93
SHA51228e1ce0ad8605855c414a7f2088e8f69e16143000403ecf8458754fa330aedb733d93024f5b2f9e67a798df54c384d824c271cce56157cd17600eff42d66aaed