Analysis
-
max time kernel
58s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 01:38
Static task
static1
Behavioral task
behavioral1
Sample
9b33e9cdde88b51ed95e860bf563b6f3374220b4a86c7658158e9512bbec20ee.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9b33e9cdde88b51ed95e860bf563b6f3374220b4a86c7658158e9512bbec20ee.exe
Resource
win10v2004-20220812-en
General
-
Target
9b33e9cdde88b51ed95e860bf563b6f3374220b4a86c7658158e9512bbec20ee.exe
-
Size
144KB
-
MD5
026ce60e8bd2e751ccf4291569e25000
-
SHA1
d6dc9032a195ce954a6e8f40003f577c5fd738e6
-
SHA256
9b33e9cdde88b51ed95e860bf563b6f3374220b4a86c7658158e9512bbec20ee
-
SHA512
8666be5eea143a06d561438273767cbea000168da71e8cf668199ee3d94328a734c43da0d654461f2afda4e3476216ddd26fc1229048fdd527dc7ef26c1ca977
-
SSDEEP
3072:bEBH9p/3K+AEkzgXrGqJM4qd3bGjhkqsXN1:U9pTAEkz6rGq4Bbq2T
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2028 sgfgrig.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\ogcwmgm.dll sgfgrig.exe File created C:\PROGRA~3\Mozilla\sgfgrig.exe 9b33e9cdde88b51ed95e860bf563b6f3374220b4a86c7658158e9512bbec20ee.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1088 wrote to memory of 2028 1088 taskeng.exe 28 PID 1088 wrote to memory of 2028 1088 taskeng.exe 28 PID 1088 wrote to memory of 2028 1088 taskeng.exe 28 PID 1088 wrote to memory of 2028 1088 taskeng.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b33e9cdde88b51ed95e860bf563b6f3374220b4a86c7658158e9512bbec20ee.exe"C:\Users\Admin\AppData\Local\Temp\9b33e9cdde88b51ed95e860bf563b6f3374220b4a86c7658158e9512bbec20ee.exe"1⤵
- Drops file in Program Files directory
PID:360
-
C:\Windows\system32\taskeng.exetaskeng.exe {641DB269-0BA9-4740-979A-4DDF0B4220C1} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\PROGRA~3\Mozilla\sgfgrig.exeC:\PROGRA~3\Mozilla\sgfgrig.exe -smuvcxh2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2028
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144KB
MD5c64ccdf9763e0bfcf3d5846bc23b331a
SHA10a62a5f7d7a5156342c709469d6bec22abfd5384
SHA256e807619cb94e8909ea0fbbfb2311aa1e8db27aea0b6dbeb3e683c60b35627efb
SHA512659da3a6f104cab1bba353df77b5434f0aa3d9ff44f67e31662744ad516fd04002174242d6a9a4c0e28d58a6f35532b3e134ca5fa1252a7cf8afdbea936d4648
-
Filesize
144KB
MD5c64ccdf9763e0bfcf3d5846bc23b331a
SHA10a62a5f7d7a5156342c709469d6bec22abfd5384
SHA256e807619cb94e8909ea0fbbfb2311aa1e8db27aea0b6dbeb3e683c60b35627efb
SHA512659da3a6f104cab1bba353df77b5434f0aa3d9ff44f67e31662744ad516fd04002174242d6a9a4c0e28d58a6f35532b3e134ca5fa1252a7cf8afdbea936d4648