Analysis
-
max time kernel
50s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 06:29
Static task
static1
Behavioral task
behavioral1
Sample
2dc95bb429e4735ee1217ef8eae79c24fd540080ddc4cb0d87d28ddebcaf9752.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2dc95bb429e4735ee1217ef8eae79c24fd540080ddc4cb0d87d28ddebcaf9752.exe
Resource
win10v2004-20220901-en
General
-
Target
2dc95bb429e4735ee1217ef8eae79c24fd540080ddc4cb0d87d28ddebcaf9752.exe
-
Size
235KB
-
MD5
496b93e12d9a0e0b7528f295cffe5f50
-
SHA1
3f4db8fbe91559aaddcc569dd7d0717196aeb565
-
SHA256
2dc95bb429e4735ee1217ef8eae79c24fd540080ddc4cb0d87d28ddebcaf9752
-
SHA512
c275f932e1281799e07e90afa9a4f584d1246fa54f9c6863b6e01391012ab9f45caa281cad87d472b724b53e5be64b4d71fc069c323318b5ab62e27ad1e7aefa
-
SSDEEP
3072:cO56oJRQMumlCm3dqQiF7xAF/yPRFrPvE5JuiBmIX9pcL5C2:cOAoXQMumNFWO/crkHuiga8L5P
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2032 sgfgrig.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\sgfgrig.exe 2dc95bb429e4735ee1217ef8eae79c24fd540080ddc4cb0d87d28ddebcaf9752.exe File created C:\PROGRA~3\Mozilla\ogcwmgm.dll sgfgrig.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 368 2dc95bb429e4735ee1217ef8eae79c24fd540080ddc4cb0d87d28ddebcaf9752.exe 2032 sgfgrig.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 832 wrote to memory of 2032 832 taskeng.exe 28 PID 832 wrote to memory of 2032 832 taskeng.exe 28 PID 832 wrote to memory of 2032 832 taskeng.exe 28 PID 832 wrote to memory of 2032 832 taskeng.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2dc95bb429e4735ee1217ef8eae79c24fd540080ddc4cb0d87d28ddebcaf9752.exe"C:\Users\Admin\AppData\Local\Temp\2dc95bb429e4735ee1217ef8eae79c24fd540080ddc4cb0d87d28ddebcaf9752.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:368
-
C:\Windows\system32\taskeng.exetaskeng.exe {96549507-C4E3-4EC1-9E9E-F232812DCB62} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:832 -
C:\PROGRA~3\Mozilla\sgfgrig.exeC:\PROGRA~3\Mozilla\sgfgrig.exe -smuvcxh2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2032
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
235KB
MD5ef9863bf16f4b2f50ac1fa7366387367
SHA13c09b60696f6892fb15a09749117b2be07bf0e95
SHA25659fb5f45d0ed8c22974caec9e51944baa6fc278e267d1b5c0faebd5660c4f469
SHA512049809313095ba30c141c81458b0bcaca719213f1b68c64746aeb13fab2e6b4fcd7aebfe4d07069475825e6e66cd1fafafa14745d22a68628b302cede9976185
-
Filesize
235KB
MD5ef9863bf16f4b2f50ac1fa7366387367
SHA13c09b60696f6892fb15a09749117b2be07bf0e95
SHA25659fb5f45d0ed8c22974caec9e51944baa6fc278e267d1b5c0faebd5660c4f469
SHA512049809313095ba30c141c81458b0bcaca719213f1b68c64746aeb13fab2e6b4fcd7aebfe4d07069475825e6e66cd1fafafa14745d22a68628b302cede9976185