Analysis
-
max time kernel
119s -
max time network
78s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 03:21
Static task
static1
Behavioral task
behavioral1
Sample
783debd023e67eb110796cb838b34df34c1e7530461e17b0e5fe00dd932c3e63N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
783debd023e67eb110796cb838b34df34c1e7530461e17b0e5fe00dd932c3e63N.exe
Resource
win10v2004-20240802-en
General
-
Target
783debd023e67eb110796cb838b34df34c1e7530461e17b0e5fe00dd932c3e63N.exe
-
Size
49KB
-
MD5
25ac59a28dac1bcc47776119e22dffc0
-
SHA1
5b5b96e88f3df5fb65cd13e55165b4659e470b7f
-
SHA256
783debd023e67eb110796cb838b34df34c1e7530461e17b0e5fe00dd932c3e63
-
SHA512
d8d717f1c2c3464423a67cd7264d178b1c13ac40f1cd2f5357c866be7f8ccf6bbbf6c992289e8f6cc0ea2bd512b9acd38fa599c68dc106bdc533e0bf5ae2a704
-
SSDEEP
768:kflivXrVKpVhKvtxwYHwVFoeAQQmucwUKzdlPPKXDbQr8u:alqrVKprVuQQ7z7PgaJ
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1560 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 2432 783debd023e67eb110796cb838b34df34c1e7530461e17b0e5fe00dd932c3e63N.exe 2432 783debd023e67eb110796cb838b34df34c1e7530461e17b0e5fe00dd932c3e63N.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\9096e1b7\jusched.exe 783debd023e67eb110796cb838b34df34c1e7530461e17b0e5fe00dd932c3e63N.exe File created C:\Program Files (x86)\9096e1b7\9096e1b7 783debd023e67eb110796cb838b34df34c1e7530461e17b0e5fe00dd932c3e63N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 783debd023e67eb110796cb838b34df34c1e7530461e17b0e5fe00dd932c3e63N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe 1560 jusched.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2432 wrote to memory of 1560 2432 783debd023e67eb110796cb838b34df34c1e7530461e17b0e5fe00dd932c3e63N.exe 31 PID 2432 wrote to memory of 1560 2432 783debd023e67eb110796cb838b34df34c1e7530461e17b0e5fe00dd932c3e63N.exe 31 PID 2432 wrote to memory of 1560 2432 783debd023e67eb110796cb838b34df34c1e7530461e17b0e5fe00dd932c3e63N.exe 31 PID 2432 wrote to memory of 1560 2432 783debd023e67eb110796cb838b34df34c1e7530461e17b0e5fe00dd932c3e63N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\783debd023e67eb110796cb838b34df34c1e7530461e17b0e5fe00dd932c3e63N.exe"C:\Users\Admin\AppData\Local\Temp\783debd023e67eb110796cb838b34df34c1e7530461e17b0e5fe00dd932c3e63N.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files (x86)\9096e1b7\jusched.exe"C:\Program Files (x86)\9096e1b7\jusched.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5f253efe302d32ab264a76e0ce65be769
SHA1768685ca582abd0af2fbb57ca37752aa98c9372b
SHA25649dca65f362fee401292ed7ada96f96295eab1e589c52e4e66bf4aedda715fdd
SHA5121990d20b462406bbadb22ba43f1ed9d0db6b250881d4ac89ad8cf6e43ca92b2fd31c3a15be1e6e149e42fdb46e58122c15bc7869a82c9490656c80df69fa77c4
-
Filesize
49KB
MD578c6ab8e81894f41893a7ec7c0c1740f
SHA1fdb3d96fcf4936ffcfb5393018d18916cbb9d93b
SHA2569be2d8525b671a3d3e3fd6bb7ccbeb8135b260d9aec0ec0852dbe11c22d6aa29
SHA5126ad262f48d0637838c7ff626dd822c5acaab5e755adceb611390026e2304f3bbd3bf43ac95a1203e9997ea9bb2c45b937664cdbf84c31bc4d86eb19c9bb02940