Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 01:10
Static task
static1
Behavioral task
behavioral1
Sample
6582aab70a912cc86a133f5b91272ebf681bd0a0247bb33993e796e9787ca46f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6582aab70a912cc86a133f5b91272ebf681bd0a0247bb33993e796e9787ca46f.exe
Resource
win10v2004-20220812-en
General
-
Target
6582aab70a912cc86a133f5b91272ebf681bd0a0247bb33993e796e9787ca46f.exe
-
Size
266KB
-
MD5
70a1aee69912d7f35ac04c4837a11eb0
-
SHA1
da0dd5a6ba7eb2a2dac71f434fe4c649a6a845f3
-
SHA256
6582aab70a912cc86a133f5b91272ebf681bd0a0247bb33993e796e9787ca46f
-
SHA512
1286c0360c9b5a5a7e2c8aaa14c9ee55441607788d0a53de97409712aa1086c3efd512a96695a92b95b1df94a98ce2ca199b36610208fee67fa66782d5fe606b
-
SSDEEP
3072:/FT6ZQ8WLjR9mKg9C0ErmMLXLg7jCm+jxqayBTT9LmafsPeHgwS2jbxWGqJsT:R6e8WLjJgk0iX+CZUpTJ9jHgwSbGqJg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1740 nswitkh.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\nswitkh.exe 6582aab70a912cc86a133f5b91272ebf681bd0a0247bb33993e796e9787ca46f.exe File created C:\PROGRA~3\Mozilla\zgooxfa.dll nswitkh.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1944 6582aab70a912cc86a133f5b91272ebf681bd0a0247bb33993e796e9787ca46f.exe 1740 nswitkh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1380 wrote to memory of 1740 1380 taskeng.exe 28 PID 1380 wrote to memory of 1740 1380 taskeng.exe 28 PID 1380 wrote to memory of 1740 1380 taskeng.exe 28 PID 1380 wrote to memory of 1740 1380 taskeng.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\6582aab70a912cc86a133f5b91272ebf681bd0a0247bb33993e796e9787ca46f.exe"C:\Users\Admin\AppData\Local\Temp\6582aab70a912cc86a133f5b91272ebf681bd0a0247bb33993e796e9787ca46f.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1944
-
C:\Windows\system32\taskeng.exetaskeng.exe {BC5001AD-0C6E-4FD3-A032-91A890EAFC5E} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\PROGRA~3\Mozilla\nswitkh.exeC:\PROGRA~3\Mozilla\nswitkh.exe -vhgoixm2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1740
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266KB
MD53bac986baa2c4e3261f7d1962462e0ad
SHA1ed529a218d016540f4e1993df95acb550d75c913
SHA256cea1b90465aeecf2cf9b631ef3f300513877560ac019349873bf88ee7991c641
SHA512c505e2e4150d122d04f5aeec540784acf38276cfa504b50901bbd8392c6317e27da21b4bf8dd8aa61ae4e6f79eb04c5a9840835f0d0f007f6b64b0f7996f1f7e
-
Filesize
266KB
MD53bac986baa2c4e3261f7d1962462e0ad
SHA1ed529a218d016540f4e1993df95acb550d75c913
SHA256cea1b90465aeecf2cf9b631ef3f300513877560ac019349873bf88ee7991c641
SHA512c505e2e4150d122d04f5aeec540784acf38276cfa504b50901bbd8392c6317e27da21b4bf8dd8aa61ae4e6f79eb04c5a9840835f0d0f007f6b64b0f7996f1f7e