Analysis
-
max time kernel
118s -
max time network
12s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
21-04-2021 18:03
Static task
static1
Behavioral task
behavioral1
Sample
2942374610000000.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
2942374610000000.exe
Resource
win10v20210408
General
-
Target
2942374610000000.exe
-
Size
5.0MB
-
MD5
59498885737e7cb3114a58df9d6ba36a
-
SHA1
a826024a0cde1262dd37e6ee7542fabc12d3e8e7
-
SHA256
f98c7b0c2c4618d63c38d0c9f7bdc1085e4008296568ee5519ad44e7a3145080
-
SHA512
67603e79638e085239d4d8a012d202f89678510779fe23e05f3b3341a04b5d5184daf781f3bb8f693ec83980f3d5cc6158fa2c81c5f5f09c1be288e5db100126
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
2942374610000000.tmpfirefox.exepid process 2016 2942374610000000.tmp 1352 firefox.exe -
Loads dropped DLL 4 IoCs
Processes:
2942374610000000.exe2942374610000000.tmpfirefox.exepid process 540 2942374610000000.exe 2016 2942374610000000.tmp 1352 firefox.exe 1352 firefox.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
2942374610000000.tmppid process 2016 2942374610000000.tmp 2016 2942374610000000.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
2942374610000000.tmppid process 2016 2942374610000000.tmp -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
2942374610000000.exe2942374610000000.tmpdescription pid process target process PID 540 wrote to memory of 2016 540 2942374610000000.exe 2942374610000000.tmp PID 540 wrote to memory of 2016 540 2942374610000000.exe 2942374610000000.tmp PID 540 wrote to memory of 2016 540 2942374610000000.exe 2942374610000000.tmp PID 540 wrote to memory of 2016 540 2942374610000000.exe 2942374610000000.tmp PID 540 wrote to memory of 2016 540 2942374610000000.exe 2942374610000000.tmp PID 540 wrote to memory of 2016 540 2942374610000000.exe 2942374610000000.tmp PID 540 wrote to memory of 2016 540 2942374610000000.exe 2942374610000000.tmp PID 2016 wrote to memory of 1352 2016 2942374610000000.tmp firefox.exe PID 2016 wrote to memory of 1352 2016 2942374610000000.tmp firefox.exe PID 2016 wrote to memory of 1352 2016 2942374610000000.tmp firefox.exe PID 2016 wrote to memory of 1352 2016 2942374610000000.tmp firefox.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2942374610000000.exe"C:\Users\Admin\AppData\Local\Temp\2942374610000000.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-EH2E1.tmp\2942374610000000.tmp"C:\Users\Admin\AppData\Local\Temp\is-EH2E1.tmp\2942374610000000.tmp" /SL5="$3015C,4505583,807936,C:\Users\Admin\AppData\Local\Temp\2942374610000000.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-15PDN.tmp\firefox.exe"C:\Users\Admin\AppData\Local\Temp\is-15PDN.tmp\firefox.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-15PDN.tmp\MSVCP140.dllMD5
d25c3ff7a4cbbffc7c9fff4f659051ce
SHA102fe8d84d7f74c2721ff47d72a6916028c8f2e8a
SHA2569c1dc36d319382e1501cdeaae36bad5b820ea84393ef6149e377d2fb2fc361a5
SHA512945fe55b43326c95f1eee643d46a53b69a463a88bd149f90e9e193d71b84f4875455d37fd4f06c1307bb2cdbe99c1f6e18cb33c0b8679cd11fea820d7e728065
-
C:\Users\Admin\AppData\Local\Temp\is-15PDN.tmp\firefox.exeMD5
52ffaba4273678bae75442f2bc85b470
SHA166a4c6cf92a4190a1480fd2b19ac84952fa715bd
SHA25670225f14a28007815b0410b1f41f7ea6a16b6329fd69f7ec06386b05862cf5c4
SHA5124d6e222378cc99b7ca64ec6738b97504201364760e94ba0276f272860608952e5a260b70a28246d6857404209c7b2ecefd0c22eba59b3788069da7a1b39266f2
-
C:\Users\Admin\AppData\Local\Temp\is-15PDN.tmp\mozglue.dllMD5
e2f7b050c6c83505611807e81db58e16
SHA1a06a6fd60486e8b27e926f30b7d20fc7b2354eed
SHA2569019976df7d3423dcceff61397360bb300f693a1bf98e5bfd33ad3fbeadd24d8
SHA512efb432a1389136a9f87b8834b9c78c1baf953b84d338621e4841376d03b0a31d1f92186786c3cd8fb390a25a2ed77a2c0f1e3c49f73c57994ef684e552969407
-
C:\Users\Admin\AppData\Local\Temp\is-EH2E1.tmp\2942374610000000.tmpMD5
5e3c59bf3ee2f8e57bb87a221e30fc5a
SHA1b65cd2b8d084e3baa52fae043bde264003dd368c
SHA256e0e5993c5c9c4675593d9329f620a29e111b27755b5a299af8798cf9fbead7ac
SHA512ffa7fd96881726f5f2c77d6d7fe1f819d6725b545f55386b12049da0f929435e32f1ac5eb331ff726ecfaf90dbdfb0db1e1c6b2a8d606ba5341bcb6263acf4b2
-
\Users\Admin\AppData\Local\Temp\is-15PDN.tmp\firefox.exeMD5
52ffaba4273678bae75442f2bc85b470
SHA166a4c6cf92a4190a1480fd2b19ac84952fa715bd
SHA25670225f14a28007815b0410b1f41f7ea6a16b6329fd69f7ec06386b05862cf5c4
SHA5124d6e222378cc99b7ca64ec6738b97504201364760e94ba0276f272860608952e5a260b70a28246d6857404209c7b2ecefd0c22eba59b3788069da7a1b39266f2
-
\Users\Admin\AppData\Local\Temp\is-15PDN.tmp\mozglue.dllMD5
e2f7b050c6c83505611807e81db58e16
SHA1a06a6fd60486e8b27e926f30b7d20fc7b2354eed
SHA2569019976df7d3423dcceff61397360bb300f693a1bf98e5bfd33ad3fbeadd24d8
SHA512efb432a1389136a9f87b8834b9c78c1baf953b84d338621e4841376d03b0a31d1f92186786c3cd8fb390a25a2ed77a2c0f1e3c49f73c57994ef684e552969407
-
\Users\Admin\AppData\Local\Temp\is-15PDN.tmp\msvcp140.dllMD5
d25c3ff7a4cbbffc7c9fff4f659051ce
SHA102fe8d84d7f74c2721ff47d72a6916028c8f2e8a
SHA2569c1dc36d319382e1501cdeaae36bad5b820ea84393ef6149e377d2fb2fc361a5
SHA512945fe55b43326c95f1eee643d46a53b69a463a88bd149f90e9e193d71b84f4875455d37fd4f06c1307bb2cdbe99c1f6e18cb33c0b8679cd11fea820d7e728065
-
\Users\Admin\AppData\Local\Temp\is-EH2E1.tmp\2942374610000000.tmpMD5
5e3c59bf3ee2f8e57bb87a221e30fc5a
SHA1b65cd2b8d084e3baa52fae043bde264003dd368c
SHA256e0e5993c5c9c4675593d9329f620a29e111b27755b5a299af8798cf9fbead7ac
SHA512ffa7fd96881726f5f2c77d6d7fe1f819d6725b545f55386b12049da0f929435e32f1ac5eb331ff726ecfaf90dbdfb0db1e1c6b2a8d606ba5341bcb6263acf4b2
-
memory/540-60-0x0000000000400000-0x00000000004D3000-memory.dmpFilesize
844KB
-
memory/540-59-0x0000000075A71000-0x0000000075A73000-memory.dmpFilesize
8KB
-
memory/1352-69-0x0000000000000000-mapping.dmp
-
memory/2016-62-0x0000000000000000-mapping.dmp
-
memory/2016-67-0x0000000074601000-0x0000000074603000-memory.dmpFilesize
8KB
-
memory/2016-66-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB