Analysis
-
max time kernel
106s -
max time network
108s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 17:23
Static task
static1
Behavioral task
behavioral1
Sample
bde72e595400943f1f4f05e9d83e1af0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bde72e595400943f1f4f05e9d83e1af0N.exe
Resource
win10v2004-20240802-en
General
-
Target
bde72e595400943f1f4f05e9d83e1af0N.exe
-
Size
426KB
-
MD5
bde72e595400943f1f4f05e9d83e1af0
-
SHA1
d361fba5ae2db05e7e5a25b570d81d837dc12bc6
-
SHA256
ec6618122fb76359cf92bf3661a5853849c6e506f9d55b1b31f0283dc92cf7a7
-
SHA512
6c7bd41c6f1cf723f0f2dc0262d61797edbfe8f6fe6334e22b6e5c8b20c99e4ebeac73409ecdf2ee91fa1bfd41fcbeddb4971500f6f0cff3e08959641a71ead2
-
SSDEEP
1536:SwQgHSLYUWjzlZLXf4QJpUT0mSBAgapetc8o/Kdgo+QGuG3gvh1nwp:SBIS3WjzrLXQQJKgmSBAVpet2Ago+l3
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2964 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 1860 bde72e595400943f1f4f05e9d83e1af0N.exe 1860 bde72e595400943f1f4f05e9d83e1af0N.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\5cabb5ac\5cabb5ac bde72e595400943f1f4f05e9d83e1af0N.exe File created C:\Program Files (x86)\5cabb5ac\jusched.exe bde72e595400943f1f4f05e9d83e1af0N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Update23.job bde72e595400943f1f4f05e9d83e1af0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bde72e595400943f1f4f05e9d83e1af0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1860 wrote to memory of 2964 1860 bde72e595400943f1f4f05e9d83e1af0N.exe 28 PID 1860 wrote to memory of 2964 1860 bde72e595400943f1f4f05e9d83e1af0N.exe 28 PID 1860 wrote to memory of 2964 1860 bde72e595400943f1f4f05e9d83e1af0N.exe 28 PID 1860 wrote to memory of 2964 1860 bde72e595400943f1f4f05e9d83e1af0N.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bde72e595400943f1f4f05e9d83e1af0N.exe"C:\Users\Admin\AppData\Local\Temp\bde72e595400943f1f4f05e9d83e1af0N.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Program Files (x86)\5cabb5ac\jusched.exe"C:\Program Files (x86)\5cabb5ac\jusched.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17B
MD52130fee70fc3f7c10d5279f96f98ad1e
SHA14307cef89171fa230048ea22546802198d888780
SHA2563506e286f6223ccaf1665d4e457b712abeb527266ff28327ce60e37b9fbeb404
SHA51267fa1bb31028ff3ba125f184207499b9205f58c9eef2ac948f5824475515c396b3d5f93e207cb96deffe1aedb286b1f935cc689c5d84449e51c517da1cffe2e5
-
Filesize
426KB
MD58f22ba397ee99e5919719869fb2942ac
SHA11e57dedf720edb77b31f5543d3e115118651718d
SHA256fba3d69f3f30e05b9823abcf096e88e2e6e55660157bf941dae3573d2f377dc2
SHA5120b39a3d91a510e4c828e3737fab60c95db4ebf2aeebb0fd2310337aa1e0454ecd7e3ce7a768de6240b96acf57fc22c244ebb726571441e19597e13044c0200b2