Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2024, 14:20
Static task
static1
Behavioral task
behavioral1
Sample
5e92bd3a4e02469c6c7a61fbff7a3d5b0822f2222ddd2745acaf4bd6a58f8a81N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5e92bd3a4e02469c6c7a61fbff7a3d5b0822f2222ddd2745acaf4bd6a58f8a81N.exe
Resource
win10v2004-20241007-en
General
-
Target
5e92bd3a4e02469c6c7a61fbff7a3d5b0822f2222ddd2745acaf4bd6a58f8a81N.exe
-
Size
66KB
-
MD5
a20cb46917b23e0f6a324566c9a1dd50
-
SHA1
be5734dfda3e0a1b4c84b9f4dd73c4f1e400e9f8
-
SHA256
5e92bd3a4e02469c6c7a61fbff7a3d5b0822f2222ddd2745acaf4bd6a58f8a81
-
SHA512
c1541b41e46b13e0a894a27c40249016ba7628bfbbc1657094141ebad20109299a27b2f654b4219feb8c3203183aface62f00d4649415366bdaa8ac1a7ce7cae
-
SSDEEP
768:D/5inm+cd5rHemPXkqUEphjVuvios1rPr4adL0NqlJfU60+ppQ1TTGfLS:DRsvcdcQjosnvnc6LQ1ES
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
griptoloji - Password:
741852
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 5e92bd3a4e02469c6c7a61fbff7a3d5b0822f2222ddd2745acaf4bd6a58f8a81N.exe -
Executes dropped EXE 1 IoCs
pid Process 112 jusched.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Java\jre-09\bin\jusched.exe 5e92bd3a4e02469c6c7a61fbff7a3d5b0822f2222ddd2745acaf4bd6a58f8a81N.exe File opened for modification C:\Program Files (x86)\Java\jre-09\bin\jusched.exe 5e92bd3a4e02469c6c7a61fbff7a3d5b0822f2222ddd2745acaf4bd6a58f8a81N.exe File created C:\Program Files (x86)\Java\jre-09\bin\UF 5e92bd3a4e02469c6c7a61fbff7a3d5b0822f2222ddd2745acaf4bd6a58f8a81N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5e92bd3a4e02469c6c7a61fbff7a3d5b0822f2222ddd2745acaf4bd6a58f8a81N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe 112 jusched.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1072 wrote to memory of 112 1072 5e92bd3a4e02469c6c7a61fbff7a3d5b0822f2222ddd2745acaf4bd6a58f8a81N.exe 85 PID 1072 wrote to memory of 112 1072 5e92bd3a4e02469c6c7a61fbff7a3d5b0822f2222ddd2745acaf4bd6a58f8a81N.exe 85 PID 1072 wrote to memory of 112 1072 5e92bd3a4e02469c6c7a61fbff7a3d5b0822f2222ddd2745acaf4bd6a58f8a81N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e92bd3a4e02469c6c7a61fbff7a3d5b0822f2222ddd2745acaf4bd6a58f8a81N.exe"C:\Users\Admin\AppData\Local\Temp\5e92bd3a4e02469c6c7a61fbff7a3d5b0822f2222ddd2745acaf4bd6a58f8a81N.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5aaaaa49d6061f704969620dc3ef93a08
SHA140e1275ef00236505911258f0db86c326cd8bb4c
SHA256e2dd5bf3b17d18e2a9ea91c985ba22642fd91d1de3c6fdbd1ec52ad9110d6928
SHA5123825ea0d43a1be3c497f28b9f58236148f7b2087c1469d051ba30ae38f0b4b6e2fbec5c5400ec8ed95777bb5278200cc175a835655413f10ea5ba928239cd0fe