Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 15:08
Static task
static1
Behavioral task
behavioral1
Sample
jtupdate.exe
Resource
win7-20240903-en
General
-
Target
jtupdate.exe
-
Size
3.1MB
-
MD5
f63fd16c77d111b761c0be7685548ba8
-
SHA1
7f1d22347868576d9b27e86881db6715efb10974
-
SHA256
0e676c1a729adf1574cd3551dc46041f735fa018d316b15e042fd359ade68b5a
-
SHA512
7331581b8d61609bd76c000279f509de215eef315e24ea4c3e316d7d56ee4a43ee7771ccd9eaa088ff119b8756d2de61e95243be8cb83583ce86c22ffc8bfdb2
-
SSDEEP
98304:UCPg3W0azM5is0azM5ioC3yXZdGWJu933NgkTosHb9u:j4Daz6iFaz6ify3GWJuVosb9u
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation jtupdate.exe -
Executes dropped EXE 1 IoCs
pid Process 1456 irsetup.exe -
resource yara_rule behavioral2/files/0x0007000000023c9b-4.dat upx behavioral2/memory/1456-11-0x0000000000400000-0x0000000000581000-memory.dmp upx behavioral2/memory/1456-24-0x0000000000400000-0x0000000000581000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jtupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language irsetup.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1456 irsetup.exe 1456 irsetup.exe 1456 irsetup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 760 wrote to memory of 1456 760 jtupdate.exe 85 PID 760 wrote to memory of 1456 760 jtupdate.exe 85 PID 760 wrote to memory of 1456 760 jtupdate.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\jtupdate.exe"C:\Users\Admin\AppData\Local\Temp\jtupdate.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe"C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe" __IRAOFF:662050 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\jtupdate.exe" "__IRCT:1" "__IRTSS:0" "__IRSID:S-1-5-21-2878641211-696417878-3864914810-1000"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
566KB
MD53fe7c92dba5c9240b4ab0d6a87e6166a
SHA17980d7dffc073515b621834246dda33ab00c308d
SHA256a7818c1e0dad1cbba4d17809688887adeeafe940a3cb53a6aeabdfcd196f7258
SHA512bd2c87b2d02b80b90f744a101bbb9294b1d90650a338be725028e6649e46a759fa72032e80ffe911ae82b005b4d2394960e7b73ce7ad8fe3a70e8a47d2a7c98d