Analysis
-
max time kernel
150s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 19:32
Static task
static1
Behavioral task
behavioral1
Sample
06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exe
Resource
win10v2004-20241007-en
General
-
Target
06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exe
-
Size
64KB
-
MD5
f0e183b86ab8b9f3dd23614b6f8a887d
-
SHA1
6927626bae28729ba6635d9daba5a7a4e3f9e0f4
-
SHA256
06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb
-
SHA512
79c81db5c377089037c7d2ca2bf6c75b15a028e6747504fcca2dacb31023f4ed4096c2f403330186ab8bb1bae822c7530af92841fd6834ba453280f533d9392d
-
SSDEEP
768:6zQYScGrIubHuYtv0xwYHw5FAe2QQncwx8Nwv92g3iVS77DeJRl05:8QTIubHR5wQQAc3iVS77my5
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exe -
Executes dropped EXE 1 IoCs
pid Process 5032 jusched.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\7360d5c8\jusched.exe 06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exe File created C:\Program Files (x86)\7360d5c8\7360d5c8 06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe 5032 jusched.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3832 wrote to memory of 5032 3832 06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exe 84 PID 3832 wrote to memory of 5032 3832 06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exe 84 PID 3832 wrote to memory of 5032 3832 06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exe"C:\Users\Admin\AppData\Local\Temp\06797dde9ab6d4a5bde3eede6251f9c9bbcfc11ff76016f9f4f29cbc6cd6e8bb.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Program Files (x86)\7360d5c8\jusched.exe"C:\Program Files (x86)\7360d5c8\jusched.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5f253efe302d32ab264a76e0ce65be769
SHA1768685ca582abd0af2fbb57ca37752aa98c9372b
SHA25649dca65f362fee401292ed7ada96f96295eab1e589c52e4e66bf4aedda715fdd
SHA5121990d20b462406bbadb22ba43f1ed9d0db6b250881d4ac89ad8cf6e43ca92b2fd31c3a15be1e6e149e42fdb46e58122c15bc7869a82c9490656c80df69fa77c4
-
Filesize
64KB
MD57944e76538d5747c133f96290002f077
SHA18bc616dea0073591072c009b9c9cd9c304764f86
SHA256ddbdbd908423d05f7462ea6b29c44c8660d890bc0beadb5e90f046fc3e0d8feb
SHA512d42f0cfbf6715f8a924c7f289fe17e4b775c3881b5121fc002a7e25c5aba12bddb02cf1b7184516bc4b118349e97f31175c10c7dae4790948211687cc325e57c