Analysis
-
max time kernel
65s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 14:43
Static task
static1
Behavioral task
behavioral1
Sample
4964c11855918b788062bfd801278d2d0db82e96f935994c310bcc4559d886e0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4964c11855918b788062bfd801278d2d0db82e96f935994c310bcc4559d886e0.exe
Resource
win10v2004-20220812-en
General
-
Target
4964c11855918b788062bfd801278d2d0db82e96f935994c310bcc4559d886e0.exe
-
Size
173KB
-
MD5
6bc73880e6227a6faf3a95296ea01dd0
-
SHA1
55e1785c1377c3f792039260c85dd3ff0d925381
-
SHA256
4964c11855918b788062bfd801278d2d0db82e96f935994c310bcc4559d886e0
-
SHA512
2329e52aaefef0ebba6c92c10c4abc6e7651be32c1707df555354e484c9662eaacfb68e48c7f4ae8f19c538e96da417c8390e665b069389a73ac5de5ca871327
-
SSDEEP
3072:g7KEcx/PGumsUbjdor/7BS4e9rPSFgLccpFQSZK+IyrfY2Nmo3bb0F:gGt/hU1YjBS4A7SqRhjrfYozLb0F
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1612 nswitkh.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\nswitkh.exe 4964c11855918b788062bfd801278d2d0db82e96f935994c310bcc4559d886e0.exe File created C:\PROGRA~3\Mozilla\zgooxfa.dll nswitkh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1708 wrote to memory of 1612 1708 taskeng.exe 29 PID 1708 wrote to memory of 1612 1708 taskeng.exe 29 PID 1708 wrote to memory of 1612 1708 taskeng.exe 29 PID 1708 wrote to memory of 1612 1708 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4964c11855918b788062bfd801278d2d0db82e96f935994c310bcc4559d886e0.exe"C:\Users\Admin\AppData\Local\Temp\4964c11855918b788062bfd801278d2d0db82e96f935994c310bcc4559d886e0.exe"1⤵
- Drops file in Program Files directory
PID:1896
-
C:\Windows\system32\taskeng.exetaskeng.exe {2F69890A-B441-45A3-8379-8D9F9FA99921} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\PROGRA~3\Mozilla\nswitkh.exeC:\PROGRA~3\Mozilla\nswitkh.exe -vhgoixm2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1612
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173KB
MD5f51c235eff3de0756630fe3b83e208c2
SHA17f92000f0167ba7fbe18805fd974cb318afa3d96
SHA25624f50a8881cc843b67e122a2a2519d250806abd04c91abd18787ac53acae0f73
SHA51221f53ad4df595f933034540604676eef1abd6a1d85f2acbc9a2f9d2af0edb10fd349af820e3dfec3a2ae3f7d9152fed2b6d6906f2a46e6acc5fe72b6466d5a5c
-
Filesize
173KB
MD5f51c235eff3de0756630fe3b83e208c2
SHA17f92000f0167ba7fbe18805fd974cb318afa3d96
SHA25624f50a8881cc843b67e122a2a2519d250806abd04c91abd18787ac53acae0f73
SHA51221f53ad4df595f933034540604676eef1abd6a1d85f2acbc9a2f9d2af0edb10fd349af820e3dfec3a2ae3f7d9152fed2b6d6906f2a46e6acc5fe72b6466d5a5c