Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 12:25
Static task
static1
Behavioral task
behavioral1
Sample
f4801982a99e42ea218a51482aa4c879e193beca5a73903365209700b86ad156.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f4801982a99e42ea218a51482aa4c879e193beca5a73903365209700b86ad156.exe
Resource
win10v2004-20241007-en
General
-
Target
f4801982a99e42ea218a51482aa4c879e193beca5a73903365209700b86ad156.exe
-
Size
57KB
-
MD5
b8859e8241cd6fa30891d5570da836c3
-
SHA1
57e329a0e24d3a2f126edcd291e863dfd2f098eb
-
SHA256
f4801982a99e42ea218a51482aa4c879e193beca5a73903365209700b86ad156
-
SHA512
3686362784d2941e34a33fb27ae4ff65aac2d2b8e70f3653945645f931c6b26b6681fe35c306c60ee3aa51f86f92a80c3c23dc39c87b1b5cf2316b3fcc4ef3e1
-
SSDEEP
1536:gQTIubHy5wQDJAejpzkGdxDLbe5vfhvqa3TmR:R4wcZpzNdxDLb6vfhv8R
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
f4801982a99e42ea218a51482aa4c879e193beca5a73903365209700b86ad156.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation f4801982a99e42ea218a51482aa4c879e193beca5a73903365209700b86ad156.exe -
Executes dropped EXE 1 IoCs
Processes:
jusched.exepid process 100 jusched.exe -
Drops file in Program Files directory 2 IoCs
Processes:
f4801982a99e42ea218a51482aa4c879e193beca5a73903365209700b86ad156.exedescription ioc process File created C:\Program Files (x86)\8bdcd58d\jusched.exe f4801982a99e42ea218a51482aa4c879e193beca5a73903365209700b86ad156.exe File created C:\Program Files (x86)\8bdcd58d\8bdcd58d f4801982a99e42ea218a51482aa4c879e193beca5a73903365209700b86ad156.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
f4801982a99e42ea218a51482aa4c879e193beca5a73903365209700b86ad156.exejusched.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f4801982a99e42ea218a51482aa4c879e193beca5a73903365209700b86ad156.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
jusched.exepid process 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe 100 jusched.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
f4801982a99e42ea218a51482aa4c879e193beca5a73903365209700b86ad156.exedescription pid process target process PID 2428 wrote to memory of 100 2428 f4801982a99e42ea218a51482aa4c879e193beca5a73903365209700b86ad156.exe jusched.exe PID 2428 wrote to memory of 100 2428 f4801982a99e42ea218a51482aa4c879e193beca5a73903365209700b86ad156.exe jusched.exe PID 2428 wrote to memory of 100 2428 f4801982a99e42ea218a51482aa4c879e193beca5a73903365209700b86ad156.exe jusched.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4801982a99e42ea218a51482aa4c879e193beca5a73903365209700b86ad156.exe"C:\Users\Admin\AppData\Local\Temp\f4801982a99e42ea218a51482aa4c879e193beca5a73903365209700b86ad156.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Program Files (x86)\8bdcd58d\jusched.exe"C:\Program Files (x86)\8bdcd58d\jusched.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5f253efe302d32ab264a76e0ce65be769
SHA1768685ca582abd0af2fbb57ca37752aa98c9372b
SHA25649dca65f362fee401292ed7ada96f96295eab1e589c52e4e66bf4aedda715fdd
SHA5121990d20b462406bbadb22ba43f1ed9d0db6b250881d4ac89ad8cf6e43ca92b2fd31c3a15be1e6e149e42fdb46e58122c15bc7869a82c9490656c80df69fa77c4
-
Filesize
57KB
MD5e83e93f25c8a6193e4ba46c17af0a4f4
SHA1ba08f749c557f203e2af63669ae5fa56130f814b
SHA2561bc64f8af587f797684bc45a8f90e9f1908fe1ddd9748491c4d15270801cdbf4
SHA5121121ba3c5d5d39f652c3b69b0bfeec78bd86e7e7fd15e69d422bd5b5f5b830f76f7bc3a2af5b205affd9695c55bf6b71e1d1943e59a6cfe5d12324353563392a