Analysis
-
max time kernel
55s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 14:11
Static task
static1
Behavioral task
behavioral1
Sample
144e296c995208b6694756a77fef09fd5a5736eb41f69c80357ab27f339b3e3a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
144e296c995208b6694756a77fef09fd5a5736eb41f69c80357ab27f339b3e3a.exe
Resource
win10v2004-20220812-en
General
-
Target
144e296c995208b6694756a77fef09fd5a5736eb41f69c80357ab27f339b3e3a.exe
-
Size
129KB
-
MD5
6e55b99502131473869aec523c8a2900
-
SHA1
f4775a9020f04d8565326aea9a06e7b4c2d1b1ca
-
SHA256
144e296c995208b6694756a77fef09fd5a5736eb41f69c80357ab27f339b3e3a
-
SHA512
ea9e1ba1894254aeeb4ea78650322ae270780085e4aafc23ec150c04d92d2d8939b173d81d80fd32d91ba0c2308f88d9e63bcedcd3c8380de73c4f60f7e5cbbb
-
SSDEEP
1536:5joWnKECoWd22auDSG3Y+0esc3BmLjIdsxUKlIXgiwdny32HSltDQMXLByBvK0Me:RRn7CoWd07esc3BURCgtdnZylqQFB07r
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1780 sgfgrig.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\sgfgrig.exe 144e296c995208b6694756a77fef09fd5a5736eb41f69c80357ab27f339b3e3a.exe File created C:\PROGRA~3\Mozilla\ogcwmgm.dll sgfgrig.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1780 1712 taskeng.exe 29 PID 1712 wrote to memory of 1780 1712 taskeng.exe 29 PID 1712 wrote to memory of 1780 1712 taskeng.exe 29 PID 1712 wrote to memory of 1780 1712 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\144e296c995208b6694756a77fef09fd5a5736eb41f69c80357ab27f339b3e3a.exe"C:\Users\Admin\AppData\Local\Temp\144e296c995208b6694756a77fef09fd5a5736eb41f69c80357ab27f339b3e3a.exe"1⤵
- Drops file in Program Files directory
PID:2000
-
C:\Windows\system32\taskeng.exetaskeng.exe {2BB7F528-FA61-4242-846A-A6D2211E971B} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\PROGRA~3\Mozilla\sgfgrig.exeC:\PROGRA~3\Mozilla\sgfgrig.exe -smuvcxh2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1780
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129KB
MD5ff5c47e4184e38e52ca7a3df0a913e5d
SHA15ca74e505f8c598812eb01c40a7bea1b1a34a582
SHA25625f3da6cc562a6eaef1f66456977a1ba94d4f8362060266ff66d34d57feaf491
SHA5120c3cf601ae13e371335dc0441fe84651524a62efaf97d5b49934f537f06ad8243a9793342e0385c0ef5ec7653b554a66dbd42d14e038ea25690ab8dbe4d0152a
-
Filesize
129KB
MD5ff5c47e4184e38e52ca7a3df0a913e5d
SHA15ca74e505f8c598812eb01c40a7bea1b1a34a582
SHA25625f3da6cc562a6eaef1f66456977a1ba94d4f8362060266ff66d34d57feaf491
SHA5120c3cf601ae13e371335dc0441fe84651524a62efaf97d5b49934f537f06ad8243a9793342e0385c0ef5ec7653b554a66dbd42d14e038ea25690ab8dbe4d0152a