Analysis
-
max time kernel
150s -
max time network
82s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 19:29
Static task
static1
Behavioral task
behavioral1
Sample
06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exe
Resource
win10v2004-20241007-en
General
-
Target
06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exe
-
Size
64KB
-
MD5
f0e183b86ab8b9f3dd23614b6f8a887d
-
SHA1
6927626bae28729ba6635d9daba5a7a4e3f9e0f4
-
SHA256
06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb
-
SHA512
79c81db5c377089037c7d2ca2bf6c75b15a028e6747504fcca2dacb31023f4ed4096c2f403330186ab8bb1bae822c7530af92841fd6834ba453280f533d9392d
-
SSDEEP
768:6zQYScGrIubHuYtv0xwYHw5FAe2QQncwx8Nwv92g3iVS77DeJRl05:8QTIubHR5wQQAc3iVS77my5
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
jusched.exepid process 2292 jusched.exe -
Loads dropped DLL 2 IoCs
Processes:
06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exepid process 2116 06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exe 2116 06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exe -
Drops file in Program Files directory 2 IoCs
Processes:
06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exedescription ioc process File created C:\Program Files (x86)\1e0fd0b8\jusched.exe 06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exe File created C:\Program Files (x86)\1e0fd0b8\1e0fd0b8 06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exejusched.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
jusched.exepid process 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe 2292 jusched.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exedescription pid process target process PID 2116 wrote to memory of 2292 2116 06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exe jusched.exe PID 2116 wrote to memory of 2292 2116 06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exe jusched.exe PID 2116 wrote to memory of 2292 2116 06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exe jusched.exe PID 2116 wrote to memory of 2292 2116 06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exe jusched.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exe"C:\Users\Admin\AppData\Local\Temp\06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Program Files (x86)\1e0fd0b8\jusched.exe"C:\Program Files (x86)\1e0fd0b8\jusched.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5f253efe302d32ab264a76e0ce65be769
SHA1768685ca582abd0af2fbb57ca37752aa98c9372b
SHA25649dca65f362fee401292ed7ada96f96295eab1e589c52e4e66bf4aedda715fdd
SHA5121990d20b462406bbadb22ba43f1ed9d0db6b250881d4ac89ad8cf6e43ca92b2fd31c3a15be1e6e149e42fdb46e58122c15bc7869a82c9490656c80df69fa77c4
-
Filesize
64KB
MD5845d239c00455fa83a7575f3ab2a5fcd
SHA1375aa80f7d54cb7285f7de36199efa71e14e6c77
SHA2566e6d9c04cf29bfcfaf521596402fe4a5d8415c5114ede27357d93a4f88f13a2a
SHA512e7f7fad3b3b7f86a2f0b82ce95bd1ed98a6a309836269f45894f8854b0e60fd4dcc1534162c48031c6394b8e61de125a73092fdc40242b457bded97401c5c209