Analysis
-
max time kernel
119s -
max time network
102s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 07:32
Static task
static1
Behavioral task
behavioral1
Sample
cdd8c02bb49a48edc97d6efbfa39bf20N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cdd8c02bb49a48edc97d6efbfa39bf20N.exe
Resource
win10v2004-20240802-en
General
-
Target
cdd8c02bb49a48edc97d6efbfa39bf20N.exe
-
Size
237KB
-
MD5
cdd8c02bb49a48edc97d6efbfa39bf20
-
SHA1
afca013448446774588e09f256a90fae500ef164
-
SHA256
21fcd5d9023ede09de7facad04b9e65700daa3bfbb54d67f782c5c92adb05611
-
SHA512
0b3bb6dc7fa84e111d5f9c5c20f8a4eec9907f24961384056beb961b7ac31025eb41b5e52e8570dd4571abd0d594b4e650c0bcc4c97102cce8c59cffe3070037
-
SSDEEP
3072:FVHgCc4xGvbwcU9KQ2BBAHmaPxiVotb5E2XLk1XA2m:YCc4xGxWKQ2BonxrXLIXAn
Malware Config
Extracted
Protocol: ftp- Host:
ftp.byethost12.com - Port:
21 - Username:
b12_8082975 - Password:
951753zx
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3032 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 2104 cdd8c02bb49a48edc97d6efbfa39bf20N.exe 2104 cdd8c02bb49a48edc97d6efbfa39bf20N.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\33b4b939\jusched.exe cdd8c02bb49a48edc97d6efbfa39bf20N.exe File created C:\Program Files (x86)\33b4b939\33b4b939 cdd8c02bb49a48edc97d6efbfa39bf20N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Update23.job cdd8c02bb49a48edc97d6efbfa39bf20N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdd8c02bb49a48edc97d6efbfa39bf20N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 3032 2104 cdd8c02bb49a48edc97d6efbfa39bf20N.exe 31 PID 2104 wrote to memory of 3032 2104 cdd8c02bb49a48edc97d6efbfa39bf20N.exe 31 PID 2104 wrote to memory of 3032 2104 cdd8c02bb49a48edc97d6efbfa39bf20N.exe 31 PID 2104 wrote to memory of 3032 2104 cdd8c02bb49a48edc97d6efbfa39bf20N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdd8c02bb49a48edc97d6efbfa39bf20N.exe"C:\Users\Admin\AppData\Local\Temp\cdd8c02bb49a48edc97d6efbfa39bf20N.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\33b4b939\jusched.exe"C:\Program Files (x86)\33b4b939\jusched.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17B
MD5134c1d489094d6d3399f65b0e9aebc1f
SHA1612a57fbe6ed3ab9c15b39451171d813314a28d5
SHA25654f9150d1268f7b4b83dd9fc3ec32274bf749715a5806ff3ca5262f5427d6781
SHA512b09bf60e4850d05261d81a124a647dd111f42480224eae8a3bd2f64736c38119953703f868ad34194a7ae6dad6aabff4081ba73df262bbe9f5327867c56a48ed
-
Filesize
237KB
MD5b8dadf18cbe502c32ee18e80e163ffda
SHA143f35a33ebff388d196d7b27000c0d63a8396144
SHA2568f27f698cc9f449491c4c4e3dbcdf0665f6a9cee72f3dd5a79a8b6bc2c62db8a
SHA512840c6c7b92b18f8ca7c913a3c6b1cbd0fba9df27d1e518e60406b9968f54128e1a5a21091e0c3beaf6ec2b8b8e361cb1a2a05d4817b5628947f2588ed87c38a2