Analysis
-
max time kernel
71s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 15:10
Static task
static1
Behavioral task
behavioral1
Sample
134e3a8897e55719c946878c0ee93fbbe94702adba1a376dddef7a29f8347c1b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
134e3a8897e55719c946878c0ee93fbbe94702adba1a376dddef7a29f8347c1b.exe
Resource
win10v2004-20220901-en
General
-
Target
134e3a8897e55719c946878c0ee93fbbe94702adba1a376dddef7a29f8347c1b.exe
-
Size
146KB
-
MD5
64114834819d4dad883e36a6d9f786c0
-
SHA1
c889027b84579f4aa0f9dd72005a9e57b815e86e
-
SHA256
134e3a8897e55719c946878c0ee93fbbe94702adba1a376dddef7a29f8347c1b
-
SHA512
b6a8c97a77ba635eb9c8bd1d95eb33953b7ab1c74d7de311ed2a090324d5a3a0e0d00eb12f08c684b99dd5d1447d8763965e06046ea69217edc77c4cecbe65aa
-
SSDEEP
3072:Q1uis3Hb+Q5Xq8+5zQWFDsJrmVyzACeJwi72jlQpBW/RsFPPtuui/2:y0bR1+5kWFQBYAcJDpo6FPPt62
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2036 nswitkh.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\nswitkh.exe 134e3a8897e55719c946878c0ee93fbbe94702adba1a376dddef7a29f8347c1b.exe File created C:\PROGRA~3\Mozilla\zgooxfa.dll nswitkh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2036 2000 taskeng.exe 28 PID 2000 wrote to memory of 2036 2000 taskeng.exe 28 PID 2000 wrote to memory of 2036 2000 taskeng.exe 28 PID 2000 wrote to memory of 2036 2000 taskeng.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\134e3a8897e55719c946878c0ee93fbbe94702adba1a376dddef7a29f8347c1b.exe"C:\Users\Admin\AppData\Local\Temp\134e3a8897e55719c946878c0ee93fbbe94702adba1a376dddef7a29f8347c1b.exe"1⤵
- Drops file in Program Files directory
PID:1664
-
C:\Windows\system32\taskeng.exetaskeng.exe {67A561F8-0A9F-4B32-9A57-A4D704C276B6} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\PROGRA~3\Mozilla\nswitkh.exeC:\PROGRA~3\Mozilla\nswitkh.exe -vhgoixm2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2036
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
146KB
MD5e31210604f41d42012743d78db669028
SHA1dd4d464f2bec7837fa8cf5aee156646d5ec816a5
SHA2564ec6ec800923f6a7a76edf6189ed6cc371ca503f3548c588b3e9b71e84b70878
SHA5122b60488230d0a749c7f5fddd8fa8e9f3b993b7c97f205e8812935cfd06b6ab311e99f2761042eb656d653418e3baec140eace5ad98f2a1088be0f8696eef63ad
-
Filesize
146KB
MD5e31210604f41d42012743d78db669028
SHA1dd4d464f2bec7837fa8cf5aee156646d5ec816a5
SHA2564ec6ec800923f6a7a76edf6189ed6cc371ca503f3548c588b3e9b71e84b70878
SHA5122b60488230d0a749c7f5fddd8fa8e9f3b993b7c97f205e8812935cfd06b6ab311e99f2761042eb656d653418e3baec140eace5ad98f2a1088be0f8696eef63ad