Analysis
-
max time kernel
44s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 13:14
Static task
static1
Behavioral task
behavioral1
Sample
e79f3e71c21771fb490187e3332f86722ea5dc97c51e931b6a8880555d3578db.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e79f3e71c21771fb490187e3332f86722ea5dc97c51e931b6a8880555d3578db.exe
Resource
win10v2004-20220812-en
General
-
Target
e79f3e71c21771fb490187e3332f86722ea5dc97c51e931b6a8880555d3578db.exe
-
Size
188KB
-
MD5
5adb4b70dbb81b917f9e94fd01cb9350
-
SHA1
dafe1575f5d20e1c13e4d3ed1e6fe9e7a5453f55
-
SHA256
e79f3e71c21771fb490187e3332f86722ea5dc97c51e931b6a8880555d3578db
-
SHA512
37a2f0cb9dd1c8d1671af951bcc89f97585678bc6e04eb0588aa8c76f98561d8702afd1d0de2f7e2a1abe81d2b03a19a8ccdb703656f5321c377a6b0e91cb1de
-
SSDEEP
3072:g7KEcx/PGumsUbjdor/7BS4e9rPSFgLccpFQSZK+IyrfY2Nmo3bb0sBF:gGt/hU1YjBS4A7SqRhjrfYozLb0s/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1716 sgfgrig.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\sgfgrig.exe e79f3e71c21771fb490187e3332f86722ea5dc97c51e931b6a8880555d3578db.exe File created C:\PROGRA~3\Mozilla\ogcwmgm.dll sgfgrig.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1736 wrote to memory of 1716 1736 taskeng.exe 29 PID 1736 wrote to memory of 1716 1736 taskeng.exe 29 PID 1736 wrote to memory of 1716 1736 taskeng.exe 29 PID 1736 wrote to memory of 1716 1736 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\e79f3e71c21771fb490187e3332f86722ea5dc97c51e931b6a8880555d3578db.exe"C:\Users\Admin\AppData\Local\Temp\e79f3e71c21771fb490187e3332f86722ea5dc97c51e931b6a8880555d3578db.exe"1⤵
- Drops file in Program Files directory
PID:1744
-
C:\Windows\system32\taskeng.exetaskeng.exe {0222C0BD-8B70-46B2-B542-57FD621ECE14} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\PROGRA~3\Mozilla\sgfgrig.exeC:\PROGRA~3\Mozilla\sgfgrig.exe -smuvcxh2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1716
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
188KB
MD5bf228100da4c007ed079081f4de2d0f0
SHA145efe84cf85443a9f3713cd09657291bd20922be
SHA256a426aa4f3dc2b7c64d85660333cc9749721cf24f64292d845b8839f11152242f
SHA512dc3573b0dca1a100fe136cb4d4127ca535bb55a3f1a793d864512333de736fe6501b16473c7ab71ead75d327844db21ff2a4e4691111155f75b1a045812c30d4
-
Filesize
188KB
MD5bf228100da4c007ed079081f4de2d0f0
SHA145efe84cf85443a9f3713cd09657291bd20922be
SHA256a426aa4f3dc2b7c64d85660333cc9749721cf24f64292d845b8839f11152242f
SHA512dc3573b0dca1a100fe136cb4d4127ca535bb55a3f1a793d864512333de736fe6501b16473c7ab71ead75d327844db21ff2a4e4691111155f75b1a045812c30d4