Analysis

  • max time kernel
    40s
  • max time network
    43s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30-09-2022 03:02

General

  • Target

    38d8da76f25130d556a450c4d285a50e.exe

  • Size

    384KB

  • MD5

    38d8da76f25130d556a450c4d285a50e

  • SHA1

    51bd64d7d005d0eeb62d1c6eb44d2285db627634

  • SHA256

    90ad2ff1c0afe2dbfb9176dce1d48ea00d1e6c68de37b477f0028381e94b0d8c

  • SHA512

    8d4d501aab72b3e5263e6899ed567c6758676663702c76a193a0c1849cef8b7ed231a018a4e419dd002e6162af961ac8eb6e584cb500c94b381cf9daf1a6b50b

  • SSDEEP

    6144:yGdXRm9hUgwUCiRonzAjyFm6+W7o/B6iUEj9eAP:1NgJCiEzAjjwo/7U6l

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies AppInit DLL entries 2 TTPs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\38d8da76f25130d556a450c4d285a50e.exe
    "C:\Users\Admin\AppData\Local\Temp\38d8da76f25130d556a450c4d285a50e.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of UnmapMainImage
    PID:1388
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {C4A8107B-E8B7-486B-AD5A-D0448BA14650} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1324
    • C:\PROGRA~3\Mozilla\jwufxge.exe
      C:\PROGRA~3\Mozilla\jwufxge.exe -kqepohf
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of UnmapMainImage
      PID:1744

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~3\Mozilla\jwufxge.exe

    Filesize

    384KB

    MD5

    de36c086d4ac9d0b8479d324bef18230

    SHA1

    70313b427f0dc4b0c2e7890496f260e782eae93c

    SHA256

    d9ffee68e5913f334cba4e39018ebda8b86e24805c476499ee83119eb556bd9c

    SHA512

    08644ab3db87f859d069721492c9891d7a95007a4d67dc90a3aa4c572f91567a617720e28ba0705e496b4a433830891604335e2a12744a766d92a1b1846758f8

  • C:\PROGRA~3\Mozilla\jwufxge.exe

    Filesize

    384KB

    MD5

    de36c086d4ac9d0b8479d324bef18230

    SHA1

    70313b427f0dc4b0c2e7890496f260e782eae93c

    SHA256

    d9ffee68e5913f334cba4e39018ebda8b86e24805c476499ee83119eb556bd9c

    SHA512

    08644ab3db87f859d069721492c9891d7a95007a4d67dc90a3aa4c572f91567a617720e28ba0705e496b4a433830891604335e2a12744a766d92a1b1846758f8

  • memory/1388-54-0x00000000768A1000-0x00000000768A3000-memory.dmp

    Filesize

    8KB

  • memory/1388-55-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/1388-56-0x0000000000570000-0x00000000005CB000-memory.dmp

    Filesize

    364KB

  • memory/1388-57-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/1388-58-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/1744-60-0x0000000000000000-mapping.dmp

  • memory/1744-62-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/1744-64-0x0000000000780000-0x00000000007DB000-memory.dmp

    Filesize

    364KB

  • memory/1744-65-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/1744-66-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB