Analysis
-
max time kernel
59s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 00:58
Static task
static1
Behavioral task
behavioral1
Sample
8edfe257ebea934a557ccc0b93067c9848ecaf296f2867360f8b2c9dbc88605f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8edfe257ebea934a557ccc0b93067c9848ecaf296f2867360f8b2c9dbc88605f.exe
Resource
win10v2004-20220812-en
General
-
Target
8edfe257ebea934a557ccc0b93067c9848ecaf296f2867360f8b2c9dbc88605f.exe
-
Size
133KB
-
MD5
6b185bda544097b7aaf8478f4093cc03
-
SHA1
971aa147124566f0c329ab3e13818ed564be5a82
-
SHA256
8edfe257ebea934a557ccc0b93067c9848ecaf296f2867360f8b2c9dbc88605f
-
SHA512
4ac633e24b41199c516ed7e950b79e394dffa51fafa565915e7acfadce171a8f57a51e36aa6789b0ec9bfad40e0b3da16c6ddba846c8e92dffc7676f1f0dba61
-
SSDEEP
3072:HAwEvRRdqcqpaiVPfGHO4xATzlypxd7CQn3pi+:TcRWcslXWRpjCS5R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1744 nswitkh.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\nswitkh.exe 8edfe257ebea934a557ccc0b93067c9848ecaf296f2867360f8b2c9dbc88605f.exe File created C:\PROGRA~3\Mozilla\zgooxfa.dll nswitkh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1752 wrote to memory of 1744 1752 taskeng.exe 28 PID 1752 wrote to memory of 1744 1752 taskeng.exe 28 PID 1752 wrote to memory of 1744 1752 taskeng.exe 28 PID 1752 wrote to memory of 1744 1752 taskeng.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8edfe257ebea934a557ccc0b93067c9848ecaf296f2867360f8b2c9dbc88605f.exe"C:\Users\Admin\AppData\Local\Temp\8edfe257ebea934a557ccc0b93067c9848ecaf296f2867360f8b2c9dbc88605f.exe"1⤵
- Drops file in Program Files directory
PID:1480
-
C:\Windows\system32\taskeng.exetaskeng.exe {95588AF0-B56A-4D72-A92E-6215F4CBEA04} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\PROGRA~3\Mozilla\nswitkh.exeC:\PROGRA~3\Mozilla\nswitkh.exe -vhgoixm2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1744
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133KB
MD541b2f00fd230760e0eed1e87c1b33975
SHA174e56ff9e6d7d37f4d631205d5d0c52b15523910
SHA256b4179182b85a088b06298fd25939fb1f39a21f5a7684c7d7b1670ebbad8b32c0
SHA5124737195fb6dea494e4d70e0cc3e90d6c8b273460d43178da63d5db2cd50eb8de52c19fdbe6c2a13d671ed474a3f1e1386b35d3d2a8a041d047f33d0bc1d65006
-
Filesize
133KB
MD541b2f00fd230760e0eed1e87c1b33975
SHA174e56ff9e6d7d37f4d631205d5d0c52b15523910
SHA256b4179182b85a088b06298fd25939fb1f39a21f5a7684c7d7b1670ebbad8b32c0
SHA5124737195fb6dea494e4d70e0cc3e90d6c8b273460d43178da63d5db2cd50eb8de52c19fdbe6c2a13d671ed474a3f1e1386b35d3d2a8a041d047f33d0bc1d65006