Analysis
-
max time kernel
150s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 02:56
Static task
static1
Behavioral task
behavioral1
Sample
ecdb6e2634d1b661065e23ec0d17f343cdc3bfb8728fb726b0fb53eacafd0987.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ecdb6e2634d1b661065e23ec0d17f343cdc3bfb8728fb726b0fb53eacafd0987.exe
Resource
win10v2004-20240802-en
General
-
Target
ecdb6e2634d1b661065e23ec0d17f343cdc3bfb8728fb726b0fb53eacafd0987.exe
-
Size
60KB
-
MD5
b4b15e9f9f3e2a61eb0f2ac2c5c54260
-
SHA1
c14f78bc224224460355024fab8127d83f3180ad
-
SHA256
ecdb6e2634d1b661065e23ec0d17f343cdc3bfb8728fb726b0fb53eacafd0987
-
SHA512
14262e39621be22224bc37a3a31ef4bffaf8e146fae51ca78d940677b4d1d2170f80259ab51093a85a67ba768fd9de36bbe8ff89e3c9d243f119947f1cc7a1ab
-
SSDEEP
768:9qSqC8+N5ozQQsncwxWmNXMX3cX8wtgtzpAXpX8/X/7CUrfbtS6qO:9rqfzQQsamN8835mv7CUronO
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation ecdb6e2634d1b661065e23ec0d17f343cdc3bfb8728fb726b0fb53eacafd0987.exe -
Executes dropped EXE 1 IoCs
pid Process 2000 jusched.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\52427987\jusched.exe ecdb6e2634d1b661065e23ec0d17f343cdc3bfb8728fb726b0fb53eacafd0987.exe File created C:\Program Files (x86)\52427987\52427987 ecdb6e2634d1b661065e23ec0d17f343cdc3bfb8728fb726b0fb53eacafd0987.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecdb6e2634d1b661065e23ec0d17f343cdc3bfb8728fb726b0fb53eacafd0987.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe 2000 jusched.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 720 wrote to memory of 2000 720 ecdb6e2634d1b661065e23ec0d17f343cdc3bfb8728fb726b0fb53eacafd0987.exe 89 PID 720 wrote to memory of 2000 720 ecdb6e2634d1b661065e23ec0d17f343cdc3bfb8728fb726b0fb53eacafd0987.exe 89 PID 720 wrote to memory of 2000 720 ecdb6e2634d1b661065e23ec0d17f343cdc3bfb8728fb726b0fb53eacafd0987.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\ecdb6e2634d1b661065e23ec0d17f343cdc3bfb8728fb726b0fb53eacafd0987.exe"C:\Users\Admin\AppData\Local\Temp\ecdb6e2634d1b661065e23ec0d17f343cdc3bfb8728fb726b0fb53eacafd0987.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Program Files (x86)\52427987\jusched.exe"C:\Program Files (x86)\52427987\jusched.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5f253efe302d32ab264a76e0ce65be769
SHA1768685ca582abd0af2fbb57ca37752aa98c9372b
SHA25649dca65f362fee401292ed7ada96f96295eab1e589c52e4e66bf4aedda715fdd
SHA5121990d20b462406bbadb22ba43f1ed9d0db6b250881d4ac89ad8cf6e43ca92b2fd31c3a15be1e6e149e42fdb46e58122c15bc7869a82c9490656c80df69fa77c4
-
Filesize
60KB
MD53e7981b8e3a2a336ba51bb6aee5f5a81
SHA1211f931a9fd03b2fdd1e98bba7cadf62410564e6
SHA256ef44d25c4c3798309e67b542cdca812249bc9b46cfe0d00af370c478ae5a6452
SHA512538f0f1d462fafea79ff4abfa0b1e71830206bf2a33db531f770c0b735fea2911ffc70c5d2c14d530d6c0ede5e7e84e836f75e189137bb41517fa6288d322925