Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 11:06
Static task
static1
Behavioral task
behavioral1
Sample
8f8ee260ee81583cdd8560b7b7d4cee0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8f8ee260ee81583cdd8560b7b7d4cee0N.exe
Resource
win10v2004-20240802-en
General
-
Target
8f8ee260ee81583cdd8560b7b7d4cee0N.exe
-
Size
35KB
-
MD5
8f8ee260ee81583cdd8560b7b7d4cee0
-
SHA1
3b438e82cf02cb7cecfac335d0913773c8a6ec31
-
SHA256
e9f404dba4a3efb9c77a6797ac84430675b88adf8ee20e912288c0072011a1e1
-
SHA512
ac283c5eba10dfe7e52db1b28124f9584d71c62408b0805ff5bc7eda0926a7ea879e0954e81793f4faab864202946f390025b9f58c9c51abaa055f40c23c24d0
-
SSDEEP
768:9qSqC8+N5ozQQsncwxWmNXMX3cX8wtgg/X/zCtgcgCEX8u/vSXrXrXrXrXrXySrB:9rqfzQQsamN88Fr277777L
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2016 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 1488 8f8ee260ee81583cdd8560b7b7d4cee0N.exe 1488 8f8ee260ee81583cdd8560b7b7d4cee0N.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\32dbd8ed\jusched.exe 8f8ee260ee81583cdd8560b7b7d4cee0N.exe File created C:\Program Files (x86)\32dbd8ed\32dbd8ed 8f8ee260ee81583cdd8560b7b7d4cee0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8f8ee260ee81583cdd8560b7b7d4cee0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe 2016 jusched.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1488 wrote to memory of 2016 1488 8f8ee260ee81583cdd8560b7b7d4cee0N.exe 31 PID 1488 wrote to memory of 2016 1488 8f8ee260ee81583cdd8560b7b7d4cee0N.exe 31 PID 1488 wrote to memory of 2016 1488 8f8ee260ee81583cdd8560b7b7d4cee0N.exe 31 PID 1488 wrote to memory of 2016 1488 8f8ee260ee81583cdd8560b7b7d4cee0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f8ee260ee81583cdd8560b7b7d4cee0N.exe"C:\Users\Admin\AppData\Local\Temp\8f8ee260ee81583cdd8560b7b7d4cee0N.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Program Files (x86)\32dbd8ed\jusched.exe"C:\Program Files (x86)\32dbd8ed\jusched.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5f253efe302d32ab264a76e0ce65be769
SHA1768685ca582abd0af2fbb57ca37752aa98c9372b
SHA25649dca65f362fee401292ed7ada96f96295eab1e589c52e4e66bf4aedda715fdd
SHA5121990d20b462406bbadb22ba43f1ed9d0db6b250881d4ac89ad8cf6e43ca92b2fd31c3a15be1e6e149e42fdb46e58122c15bc7869a82c9490656c80df69fa77c4
-
Filesize
35KB
MD5b8870f9e86e2bd575e840fc0e6979ec9
SHA1e476e2dcd727df5ec9e5195b7de572ce267724f3
SHA2564b7eedb69a8eca43af324f2fd6021c74413f7c9dde9a659dcfa9218534de69d0
SHA51279d734af9685122f93b2b57a68bc9fea4829a06fd8da666a7a5918f88123f41d189fc7357da50ee462abdf539db3a0c60a802b698e378edf1e3231535fb5bf49