Analysis
-
max time kernel
85s -
max time network
78s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 19:52
Static task
static1
Behavioral task
behavioral1
Sample
c266a80102b18214213c40df8ae1a590N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c266a80102b18214213c40df8ae1a590N.exe
Resource
win10v2004-20240802-en
General
-
Target
c266a80102b18214213c40df8ae1a590N.exe
-
Size
213KB
-
MD5
c266a80102b18214213c40df8ae1a590
-
SHA1
22e116c56d8003cc76ebc20c9c6208ddc39d4c2b
-
SHA256
394815d29801462e7c64bcd3eae9aa337e44f8153e1128964132e1bf7c2e8461
-
SHA512
1517295e31eb032f0300d4b2282d55999c5e2d287b66ce857ccb7c49481a9df7e9e93314434df50573e03df07ba943527777679ee5ecafb5a1bb217028fcecb0
-
SSDEEP
1536:P5AiTLOQ74YDtnlN5UL09atT0mBBAragjSvIYFwAmd/oHQpNulP:P53mQ7JtnP5I09qgmBBAWgjSvwN/oHWm
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2316 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 1292 c266a80102b18214213c40df8ae1a590N.exe 1292 c266a80102b18214213c40df8ae1a590N.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\a22e3d52\jusched.exe c266a80102b18214213c40df8ae1a590N.exe File created C:\Program Files (x86)\a22e3d52\a22e3d52 c266a80102b18214213c40df8ae1a590N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Update23.job c266a80102b18214213c40df8ae1a590N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c266a80102b18214213c40df8ae1a590N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1292 wrote to memory of 2316 1292 c266a80102b18214213c40df8ae1a590N.exe 30 PID 1292 wrote to memory of 2316 1292 c266a80102b18214213c40df8ae1a590N.exe 30 PID 1292 wrote to memory of 2316 1292 c266a80102b18214213c40df8ae1a590N.exe 30 PID 1292 wrote to memory of 2316 1292 c266a80102b18214213c40df8ae1a590N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c266a80102b18214213c40df8ae1a590N.exe"C:\Users\Admin\AppData\Local\Temp\c266a80102b18214213c40df8ae1a590N.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Program Files (x86)\a22e3d52\jusched.exe"C:\Program Files (x86)\a22e3d52\jusched.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17B
MD54d77d6b250ffb567743b8dbcdad695b8
SHA1d5a8f98f9433f6d36c74df463cef3e2cf524462d
SHA2567ec7a3a23890c3592f5b762aecf11adbf8831fad11b8048aedfa7315d599c5f2
SHA5125655153049101fd67125d484c81f1ad30b44f36f00e3aabfe8d730a21661f4b394357b60da549289def4311b4cc7bd508d8fd6b8db254cd442b2152f8902bd71
-
Filesize
213KB
MD59f189e5a9c2f541453665430ea53853a
SHA17eba1e947e4cb7ca3149012baf87c388a73193c7
SHA25636313bfc3c56ebc844bf0cbbd289708024f2dacec916f02c1b69e22435b958c0
SHA5127ad2fb73e6343a1e931fc7cc08a685e6a688bb18df792fe38261c362bff876e7ed62710ac2880586b5eecaa04929c2775e773ed80551d159563feb8981c1f704