Analysis
-
max time kernel
120s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/11/2024, 14:20
Static task
static1
Behavioral task
behavioral1
Sample
5e92bd3a4e02469c6c7a61fbff7a3d5b0822f2222ddd2745acaf4bd6a58f8a81N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5e92bd3a4e02469c6c7a61fbff7a3d5b0822f2222ddd2745acaf4bd6a58f8a81N.exe
Resource
win10v2004-20241007-en
General
-
Target
5e92bd3a4e02469c6c7a61fbff7a3d5b0822f2222ddd2745acaf4bd6a58f8a81N.exe
-
Size
66KB
-
MD5
a20cb46917b23e0f6a324566c9a1dd50
-
SHA1
be5734dfda3e0a1b4c84b9f4dd73c4f1e400e9f8
-
SHA256
5e92bd3a4e02469c6c7a61fbff7a3d5b0822f2222ddd2745acaf4bd6a58f8a81
-
SHA512
c1541b41e46b13e0a894a27c40249016ba7628bfbbc1657094141ebad20109299a27b2f654b4219feb8c3203183aface62f00d4649415366bdaa8ac1a7ce7cae
-
SSDEEP
768:D/5inm+cd5rHemPXkqUEphjVuvios1rPr4adL0NqlJfU60+ppQ1TTGfLS:DRsvcdcQjosnvnc6LQ1ES
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
griptoloji - Password:
741852
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2516 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 2032 5e92bd3a4e02469c6c7a61fbff7a3d5b0822f2222ddd2745acaf4bd6a58f8a81N.exe 2032 5e92bd3a4e02469c6c7a61fbff7a3d5b0822f2222ddd2745acaf4bd6a58f8a81N.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Java\jre-09\bin\jusched.exe 5e92bd3a4e02469c6c7a61fbff7a3d5b0822f2222ddd2745acaf4bd6a58f8a81N.exe File opened for modification C:\Program Files (x86)\Java\jre-09\bin\jusched.exe 5e92bd3a4e02469c6c7a61fbff7a3d5b0822f2222ddd2745acaf4bd6a58f8a81N.exe File created C:\Program Files (x86)\Java\jre-09\bin\UF 5e92bd3a4e02469c6c7a61fbff7a3d5b0822f2222ddd2745acaf4bd6a58f8a81N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5e92bd3a4e02469c6c7a61fbff7a3d5b0822f2222ddd2745acaf4bd6a58f8a81N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe 2516 jusched.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2516 2032 5e92bd3a4e02469c6c7a61fbff7a3d5b0822f2222ddd2745acaf4bd6a58f8a81N.exe 30 PID 2032 wrote to memory of 2516 2032 5e92bd3a4e02469c6c7a61fbff7a3d5b0822f2222ddd2745acaf4bd6a58f8a81N.exe 30 PID 2032 wrote to memory of 2516 2032 5e92bd3a4e02469c6c7a61fbff7a3d5b0822f2222ddd2745acaf4bd6a58f8a81N.exe 30 PID 2032 wrote to memory of 2516 2032 5e92bd3a4e02469c6c7a61fbff7a3d5b0822f2222ddd2745acaf4bd6a58f8a81N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e92bd3a4e02469c6c7a61fbff7a3d5b0822f2222ddd2745acaf4bd6a58f8a81N.exe"C:\Users\Admin\AppData\Local\Temp\5e92bd3a4e02469c6c7a61fbff7a3d5b0822f2222ddd2745acaf4bd6a58f8a81N.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD514855c6f0a576041bec4d263a40a58a5
SHA1049add431f5da5efe99c1f5952f8f4271c562f9e
SHA25656f4cfcdd739b9c53c6bf5652ccc55cd45c3f3c973d8f34e10b7913f920b53f3
SHA512c7f641c70aa3021edbfb02f69bbeb04ee0af46e5610551a15483ac06840cc6b5364a6b4131a9c5400695f503543096557356e04b0880c167ec26bb5c4cefd700