Analysis
-
max time kernel
37s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 06:17
Static task
static1
Behavioral task
behavioral1
Sample
f6ac70dd7c9530dc82dbaca8f4179c5bbd2ebcc469983725e14362b60c147b1a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f6ac70dd7c9530dc82dbaca8f4179c5bbd2ebcc469983725e14362b60c147b1a.exe
Resource
win10v2004-20220812-en
General
-
Target
f6ac70dd7c9530dc82dbaca8f4179c5bbd2ebcc469983725e14362b60c147b1a.exe
-
Size
145KB
-
MD5
5e43be2edee81ac26b7aa39004148f70
-
SHA1
a945701e03e5314934b5f1d7a1b7cd860ffecb18
-
SHA256
f6ac70dd7c9530dc82dbaca8f4179c5bbd2ebcc469983725e14362b60c147b1a
-
SHA512
084853a450f2340f473468ab4c1b31c2aa625ced0ba55de8cd69884baadd5f5ef3031193c0363a35f80530191b377a8e47fe49f47b10e74b268abb0f3f02a869
-
SSDEEP
3072:HAwEvRRdqcqpaiVPfGHO4xATzlypxd7CQn3piYtW0CR:TcRWcslXWRpjCS5TW0CR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1536 nswitkh.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\nswitkh.exe f6ac70dd7c9530dc82dbaca8f4179c5bbd2ebcc469983725e14362b60c147b1a.exe File created C:\PROGRA~3\Mozilla\zgooxfa.dll nswitkh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1704 wrote to memory of 1536 1704 taskeng.exe 29 PID 1704 wrote to memory of 1536 1704 taskeng.exe 29 PID 1704 wrote to memory of 1536 1704 taskeng.exe 29 PID 1704 wrote to memory of 1536 1704 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6ac70dd7c9530dc82dbaca8f4179c5bbd2ebcc469983725e14362b60c147b1a.exe"C:\Users\Admin\AppData\Local\Temp\f6ac70dd7c9530dc82dbaca8f4179c5bbd2ebcc469983725e14362b60c147b1a.exe"1⤵
- Drops file in Program Files directory
PID:1032
-
C:\Windows\system32\taskeng.exetaskeng.exe {1C29BF52-FF6A-4100-B134-37D87428B58E} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\PROGRA~3\Mozilla\nswitkh.exeC:\PROGRA~3\Mozilla\nswitkh.exe -vhgoixm2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1536
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145KB
MD534c90c474b0f16de25c1215060c7e172
SHA1301d0ba0c76288d95194a2ddf16625a0c0a7d5b3
SHA256a56a3a7398e65ac86a326da6e73a7ea2d96fe540191e3f9c1e9ef694d8c1a47f
SHA512867d636010be7298cbc5e687e8520b2c12e18967794778c3c1c3fc68b023bcbce49132cd43c7de6dc1b8307b0ec3b31bd6053de3fe84aa5036e84ed95ca6e905
-
Filesize
145KB
MD534c90c474b0f16de25c1215060c7e172
SHA1301d0ba0c76288d95194a2ddf16625a0c0a7d5b3
SHA256a56a3a7398e65ac86a326da6e73a7ea2d96fe540191e3f9c1e9ef694d8c1a47f
SHA512867d636010be7298cbc5e687e8520b2c12e18967794778c3c1c3fc68b023bcbce49132cd43c7de6dc1b8307b0ec3b31bd6053de3fe84aa5036e84ed95ca6e905