Analysis
-
max time kernel
150s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 00:59
Static task
static1
Behavioral task
behavioral1
Sample
a76288dc73ae8c858f08e8c219c93a96443dabadd9fbf31dde0fb75950e09369.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a76288dc73ae8c858f08e8c219c93a96443dabadd9fbf31dde0fb75950e09369.exe
Resource
win10v2004-20240802-en
General
-
Target
a76288dc73ae8c858f08e8c219c93a96443dabadd9fbf31dde0fb75950e09369.exe
-
Size
46KB
-
MD5
81e487552bf16d193aacad1f1c5da1e5
-
SHA1
4e4631b32a0affc5c875f8d2f58b4c4f2bec7fa4
-
SHA256
a76288dc73ae8c858f08e8c219c93a96443dabadd9fbf31dde0fb75950e09369
-
SHA512
e7c9e0dfcdae451ff7a03d72d96ee43bdd3109bafbcdc2aafafaed86fbdec29c9b004b883fdae03f32aea22c939e713cce8f73c07bc5658a02d6160e0bd614a2
-
SSDEEP
768:zIP5WOMVs4PSV06ymNNC6S7Cm1n2OBGRIWNSE77NPQ1TTGfGYi6KMfJ:zI0OGrOy6NvSpMZVQ1J4KMfJ
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
griptoloji
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1188 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 2160 a76288dc73ae8c858f08e8c219c93a96443dabadd9fbf31dde0fb75950e09369.exe 2160 a76288dc73ae8c858f08e8c219c93a96443dabadd9fbf31dde0fb75950e09369.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Java\jre-09\bin\jusched.exe a76288dc73ae8c858f08e8c219c93a96443dabadd9fbf31dde0fb75950e09369.exe File opened for modification C:\Program Files (x86)\Java\jre-09\bin\jusched.exe a76288dc73ae8c858f08e8c219c93a96443dabadd9fbf31dde0fb75950e09369.exe File created C:\Program Files (x86)\Java\jre-09\bin\UF a76288dc73ae8c858f08e8c219c93a96443dabadd9fbf31dde0fb75950e09369.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a76288dc73ae8c858f08e8c219c93a96443dabadd9fbf31dde0fb75950e09369.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe 1188 jusched.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2160 wrote to memory of 1188 2160 a76288dc73ae8c858f08e8c219c93a96443dabadd9fbf31dde0fb75950e09369.exe 29 PID 2160 wrote to memory of 1188 2160 a76288dc73ae8c858f08e8c219c93a96443dabadd9fbf31dde0fb75950e09369.exe 29 PID 2160 wrote to memory of 1188 2160 a76288dc73ae8c858f08e8c219c93a96443dabadd9fbf31dde0fb75950e09369.exe 29 PID 2160 wrote to memory of 1188 2160 a76288dc73ae8c858f08e8c219c93a96443dabadd9fbf31dde0fb75950e09369.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\a76288dc73ae8c858f08e8c219c93a96443dabadd9fbf31dde0fb75950e09369.exe"C:\Users\Admin\AppData\Local\Temp\a76288dc73ae8c858f08e8c219c93a96443dabadd9fbf31dde0fb75950e09369.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD566e148d46e67e3d0adf859435f704f35
SHA1d1aeae699b34547a11117cc63c4b477c1013ab4f
SHA25628720e980ebbe5eb7c50a878231a95ab0729dd6dd7ca2bf0fc328e96a00b7359
SHA512930215788a407003a4d7639965ff7d5d3a7f9ab98e17c1278e13238a04a7634f57193972c747d554fd4615f92c93d3cb8ae17c60eb51e74aaff5ae8d2f138a6f