Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 19:29
Static task
static1
Behavioral task
behavioral1
Sample
06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exe
Resource
win10v2004-20241007-en
General
-
Target
06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exe
-
Size
64KB
-
MD5
f0e183b86ab8b9f3dd23614b6f8a887d
-
SHA1
6927626bae28729ba6635d9daba5a7a4e3f9e0f4
-
SHA256
06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb
-
SHA512
79c81db5c377089037c7d2ca2bf6c75b15a028e6747504fcca2dacb31023f4ed4096c2f403330186ab8bb1bae822c7530af92841fd6834ba453280f533d9392d
-
SSDEEP
768:6zQYScGrIubHuYtv0xwYHw5FAe2QQncwx8Nwv92g3iVS77DeJRl05:8QTIubHR5wQQAc3iVS77my5
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exe -
Executes dropped EXE 1 IoCs
Processes:
jusched.exepid process 3560 jusched.exe -
Drops file in Program Files directory 2 IoCs
Processes:
06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exedescription ioc process File created C:\Program Files (x86)\163b57d3\163b57d3 06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exe File created C:\Program Files (x86)\163b57d3\jusched.exe 06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exejusched.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
jusched.exepid process 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe 3560 jusched.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exedescription pid process target process PID 1620 wrote to memory of 3560 1620 06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exe jusched.exe PID 1620 wrote to memory of 3560 1620 06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exe jusched.exe PID 1620 wrote to memory of 3560 1620 06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exe jusched.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exe"C:\Users\Admin\AppData\Local\Temp\06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Program Files (x86)\163b57d3\jusched.exe"C:\Program Files (x86)\163b57d3\jusched.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5f253efe302d32ab264a76e0ce65be769
SHA1768685ca582abd0af2fbb57ca37752aa98c9372b
SHA25649dca65f362fee401292ed7ada96f96295eab1e589c52e4e66bf4aedda715fdd
SHA5121990d20b462406bbadb22ba43f1ed9d0db6b250881d4ac89ad8cf6e43ca92b2fd31c3a15be1e6e149e42fdb46e58122c15bc7869a82c9490656c80df69fa77c4
-
Filesize
64KB
MD5fddfa747fcbfe708bbc17a804ecf65b1
SHA1b17ffd22605a7c000516811605f88d8d8aa89b99
SHA256b3214503c14f1ffcd42da667f20dd377bfd5a887b8afab6b7e71835752bb92d2
SHA51275bc8746c522532dc66eb7967227fec854c75401d50e30f9b3d57a9ce27f3907927551f8a05d578227c24cc1e04e94e9f6ebe8fc316fa07d2baacf85307b76ea