Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 13:07
Static task
static1
Behavioral task
behavioral1
Sample
f2651441c8e15066d0fca7dd609e4d8070218fc767506af091ff0561ee82dde9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f2651441c8e15066d0fca7dd609e4d8070218fc767506af091ff0561ee82dde9.exe
Resource
win10v2004-20220812-en
General
-
Target
f2651441c8e15066d0fca7dd609e4d8070218fc767506af091ff0561ee82dde9.exe
-
Size
222KB
-
MD5
5e4c3e876c2f70f7c24898c012556840
-
SHA1
182755ba7283ff55281b5eb22261ef9f86c22985
-
SHA256
f2651441c8e15066d0fca7dd609e4d8070218fc767506af091ff0561ee82dde9
-
SHA512
d1c9c639c02490a4831d1ea953ed4e8b77525dbb6b4c9b768b895c1aa6909adf0f3a2361668197398ebe258174d2c50778384fd6b8740190e92c2be1083924ce
-
SSDEEP
3072:DJC7MKza/YmV7R+y8Io5VHPCaROG2/1iDg61Oe65HvOmzn1aDGrXi:Dw7r6RUxvrOG2/1iDsDRZrXi
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 284 jjruejn.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\jjruejn.exe f2651441c8e15066d0fca7dd609e4d8070218fc767506af091ff0561ee82dde9.exe File created C:\PROGRA~3\Mozilla\segfnra.dll jjruejn.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1492 f2651441c8e15066d0fca7dd609e4d8070218fc767506af091ff0561ee82dde9.exe 284 jjruejn.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1160 wrote to memory of 284 1160 taskeng.exe 28 PID 1160 wrote to memory of 284 1160 taskeng.exe 28 PID 1160 wrote to memory of 284 1160 taskeng.exe 28 PID 1160 wrote to memory of 284 1160 taskeng.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2651441c8e15066d0fca7dd609e4d8070218fc767506af091ff0561ee82dde9.exe"C:\Users\Admin\AppData\Local\Temp\f2651441c8e15066d0fca7dd609e4d8070218fc767506af091ff0561ee82dde9.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1492
-
C:\Windows\system32\taskeng.exetaskeng.exe {56019283-6A09-4C33-82F5-9620522016AA} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\PROGRA~3\Mozilla\jjruejn.exeC:\PROGRA~3\Mozilla\jjruejn.exe -npivonl2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:284
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
222KB
MD5bcf28d622d87d9417f2931330b83eb3d
SHA1aa2a4026a46dbf3d8915b17663d12eab485d9091
SHA256d83618989fb813bbe7bc3a561c0b1852a00b243abe979d2702dbcd62e5ed323a
SHA512821e971f02d0b015b1bd778d1652bb79bc412eddc3c1daa3b4056845a217ef1ea3097e3425c24459ffd8a342207012ed22e83a5a64ebd8b14c26eb1b95f06365
-
Filesize
222KB
MD5bcf28d622d87d9417f2931330b83eb3d
SHA1aa2a4026a46dbf3d8915b17663d12eab485d9091
SHA256d83618989fb813bbe7bc3a561c0b1852a00b243abe979d2702dbcd62e5ed323a
SHA512821e971f02d0b015b1bd778d1652bb79bc412eddc3c1daa3b4056845a217ef1ea3097e3425c24459ffd8a342207012ed22e83a5a64ebd8b14c26eb1b95f06365