Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 05:45
Static task
static1
Behavioral task
behavioral1
Sample
d6642657cbb5913bdc30d71e5e06589d5c08c5ecdacc2b6dbc081d9182ac7a1e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6642657cbb5913bdc30d71e5e06589d5c08c5ecdacc2b6dbc081d9182ac7a1e.exe
Resource
win10v2004-20241007-en
General
-
Target
d6642657cbb5913bdc30d71e5e06589d5c08c5ecdacc2b6dbc081d9182ac7a1e.exe
-
Size
96KB
-
MD5
79a55854d5d72f5cb04a2b8efed5b4b5
-
SHA1
154a9fc82a3afc68249cec3ce561f56b670fe644
-
SHA256
d6642657cbb5913bdc30d71e5e06589d5c08c5ecdacc2b6dbc081d9182ac7a1e
-
SHA512
5b85bd41dd25153fd9d84ff09bf90ed76ab39400428e156e9da51256794383bb984755039b8cd163c4a7c3086d48d4c054b19aa4796acf03fac9ac2641000a45
-
SSDEEP
768:r/5inm+cd5rHemPXkqUEphjVuvios1rPr4adL0NqlJMU60+ppQ1TTGfLB:rRsvcdcQjosnvnZ6LQ1EB
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
griptoloji - Password:
741852
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2860 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 2444 d6642657cbb5913bdc30d71e5e06589d5c08c5ecdacc2b6dbc081d9182ac7a1e.exe 2444 d6642657cbb5913bdc30d71e5e06589d5c08c5ecdacc2b6dbc081d9182ac7a1e.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Java\jre-09\bin\jusched.exe d6642657cbb5913bdc30d71e5e06589d5c08c5ecdacc2b6dbc081d9182ac7a1e.exe File opened for modification C:\Program Files (x86)\Java\jre-09\bin\jusched.exe d6642657cbb5913bdc30d71e5e06589d5c08c5ecdacc2b6dbc081d9182ac7a1e.exe File created C:\Program Files (x86)\Java\jre-09\bin\UF d6642657cbb5913bdc30d71e5e06589d5c08c5ecdacc2b6dbc081d9182ac7a1e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6642657cbb5913bdc30d71e5e06589d5c08c5ecdacc2b6dbc081d9182ac7a1e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe 2860 jusched.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2860 2444 d6642657cbb5913bdc30d71e5e06589d5c08c5ecdacc2b6dbc081d9182ac7a1e.exe 30 PID 2444 wrote to memory of 2860 2444 d6642657cbb5913bdc30d71e5e06589d5c08c5ecdacc2b6dbc081d9182ac7a1e.exe 30 PID 2444 wrote to memory of 2860 2444 d6642657cbb5913bdc30d71e5e06589d5c08c5ecdacc2b6dbc081d9182ac7a1e.exe 30 PID 2444 wrote to memory of 2860 2444 d6642657cbb5913bdc30d71e5e06589d5c08c5ecdacc2b6dbc081d9182ac7a1e.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6642657cbb5913bdc30d71e5e06589d5c08c5ecdacc2b6dbc081d9182ac7a1e.exe"C:\Users\Admin\AppData\Local\Temp\d6642657cbb5913bdc30d71e5e06589d5c08c5ecdacc2b6dbc081d9182ac7a1e.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5b94673678b3f75d4cae3650ba92f4476
SHA175e0bed1784cd881fa978f8eb6c6dbc52c13f8f5
SHA25692f21dd251739441d6a822872114c1a50353c9f288b8618f4aab84b7cf7d1e52
SHA512f73e1b5869d95a4ead334be648a26bc2e38c195a55a2838cd4921836cfd8d5be4e452c22441e65bb284ffd5151be2041cc27ae5d48d1ac19cdb2d21f84e6ddbf