Analysis
-
max time kernel
150s -
max time network
82s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 12:25
Static task
static1
Behavioral task
behavioral1
Sample
f4801982a99e42ea218a51482aa4c879e193beca5a73903365209700b86ad156.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f4801982a99e42ea218a51482aa4c879e193beca5a73903365209700b86ad156.exe
Resource
win10v2004-20241007-en
General
-
Target
f4801982a99e42ea218a51482aa4c879e193beca5a73903365209700b86ad156.exe
-
Size
57KB
-
MD5
b8859e8241cd6fa30891d5570da836c3
-
SHA1
57e329a0e24d3a2f126edcd291e863dfd2f098eb
-
SHA256
f4801982a99e42ea218a51482aa4c879e193beca5a73903365209700b86ad156
-
SHA512
3686362784d2941e34a33fb27ae4ff65aac2d2b8e70f3653945645f931c6b26b6681fe35c306c60ee3aa51f86f92a80c3c23dc39c87b1b5cf2316b3fcc4ef3e1
-
SSDEEP
1536:gQTIubHy5wQDJAejpzkGdxDLbe5vfhvqa3TmR:R4wcZpzNdxDLb6vfhv8R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
jusched.exepid process 2460 jusched.exe -
Loads dropped DLL 2 IoCs
Processes:
f4801982a99e42ea218a51482aa4c879e193beca5a73903365209700b86ad156.exepid process 2220 f4801982a99e42ea218a51482aa4c879e193beca5a73903365209700b86ad156.exe 2220 f4801982a99e42ea218a51482aa4c879e193beca5a73903365209700b86ad156.exe -
Drops file in Program Files directory 2 IoCs
Processes:
f4801982a99e42ea218a51482aa4c879e193beca5a73903365209700b86ad156.exedescription ioc process File created C:\Program Files (x86)\d891b971\jusched.exe f4801982a99e42ea218a51482aa4c879e193beca5a73903365209700b86ad156.exe File created C:\Program Files (x86)\d891b971\d891b971 f4801982a99e42ea218a51482aa4c879e193beca5a73903365209700b86ad156.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
f4801982a99e42ea218a51482aa4c879e193beca5a73903365209700b86ad156.exejusched.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f4801982a99e42ea218a51482aa4c879e193beca5a73903365209700b86ad156.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
jusched.exepid process 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe 2460 jusched.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
f4801982a99e42ea218a51482aa4c879e193beca5a73903365209700b86ad156.exedescription pid process target process PID 2220 wrote to memory of 2460 2220 f4801982a99e42ea218a51482aa4c879e193beca5a73903365209700b86ad156.exe jusched.exe PID 2220 wrote to memory of 2460 2220 f4801982a99e42ea218a51482aa4c879e193beca5a73903365209700b86ad156.exe jusched.exe PID 2220 wrote to memory of 2460 2220 f4801982a99e42ea218a51482aa4c879e193beca5a73903365209700b86ad156.exe jusched.exe PID 2220 wrote to memory of 2460 2220 f4801982a99e42ea218a51482aa4c879e193beca5a73903365209700b86ad156.exe jusched.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4801982a99e42ea218a51482aa4c879e193beca5a73903365209700b86ad156.exe"C:\Users\Admin\AppData\Local\Temp\f4801982a99e42ea218a51482aa4c879e193beca5a73903365209700b86ad156.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\d891b971\jusched.exe"C:\Program Files (x86)\d891b971\jusched.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5f253efe302d32ab264a76e0ce65be769
SHA1768685ca582abd0af2fbb57ca37752aa98c9372b
SHA25649dca65f362fee401292ed7ada96f96295eab1e589c52e4e66bf4aedda715fdd
SHA5121990d20b462406bbadb22ba43f1ed9d0db6b250881d4ac89ad8cf6e43ca92b2fd31c3a15be1e6e149e42fdb46e58122c15bc7869a82c9490656c80df69fa77c4
-
Filesize
57KB
MD5f6a82c5b46db45f0f4793c5958041bff
SHA155fff78ac164a152215e894b8633e30c03312637
SHA2561c70ece64249707c1032c8d343826d24381e0ae393fbf6e05c3f8567c37854bd
SHA5125ef218557702c670ed7a36bc9d49d03f865c69f104258458fcfc7de9dea31cdc0ab1c6452b0127398acab0edf4b1c57a04bfedb883d61a25a16205ce5b1bc418