Analysis

  • max time kernel
    119s
  • max time network
    92s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/09/2024, 06:46

General

  • Target

    a17f66b5cdf94e558195b7c163e12640N.exe

  • Size

    96KB

  • MD5

    a17f66b5cdf94e558195b7c163e12640

  • SHA1

    ef3943864796d208aff8e3d57bfe2085143ab123

  • SHA256

    7ff297e9e64f6c203633d5052ad3e6c58a1662ddbbee35c7c6c3a79f5659dd78

  • SHA512

    8e627b1e0eedce93eed9ef11f7ed6c5a060271473826d25fe05a252d9c50e128f308bdde9bcf899f5b13fd54f421cb463566a74bb62f677a97975c73d44e0239

  • SSDEEP

    768:p/5inm+cd5rHemPXkqUEphjVuvios1rPr4adL0NqlJi+vBU6u7DPQ1TTGfGYc+pX:pRsvcdcQjosnvng6uQ1JO

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    griptoloji
  • Password:
    741852

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a17f66b5cdf94e558195b7c163e12640N.exe
    "C:\Users\Admin\AppData\Local\Temp\a17f66b5cdf94e558195b7c163e12640N.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3728
    • C:\Program Files (x86)\Java\jre-09\bin\jusched.exe
      "C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Java\jre-09\bin\jusched.exe

    Filesize

    96KB

    MD5

    ac0aedb58552326d11f88c2034f830eb

    SHA1

    91b157fd48d40ee396358d32922faaf7c84830c4

    SHA256

    aa3c25ce5043ca12037b91b90286ddc00c392c48a10150f619966897d561bc93

    SHA512

    28e1ce0ad8605855c414a7f2088e8f69e16143000403ecf8458754fa330aedb733d93024f5b2f9e67a798df54c384d824c271cce56157cd17600eff42d66aaed

  • memory/1060-12-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/3728-0-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/3728-11-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB