Analysis
-
max time kernel
44s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 07:26
Static task
static1
Behavioral task
behavioral1
Sample
7aaf257fa8f11d4750fb97723a2f21263940ddcdbda2f87bc3eeb33801c22404.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7aaf257fa8f11d4750fb97723a2f21263940ddcdbda2f87bc3eeb33801c22404.exe
Resource
win10v2004-20220901-en
General
-
Target
7aaf257fa8f11d4750fb97723a2f21263940ddcdbda2f87bc3eeb33801c22404.exe
-
Size
347KB
-
MD5
6c09efea0d7841517aedd6f887b19160
-
SHA1
b4961d7f03f3b4792673a21ec48c4c1d13e0743a
-
SHA256
7aaf257fa8f11d4750fb97723a2f21263940ddcdbda2f87bc3eeb33801c22404
-
SHA512
a2e436a28d59de2e550234973a0d298889572d106ca5383687c6a57589b945ae230d1745d34c7083d264827f6b2f7d32fcd865922a98fed73f6df83e3dfa3cc5
-
SSDEEP
6144:CDJVazMKV31FdaQvXluxqU+A/0y+nt75voqQEnHv0CxN8H9RJPz7Dhzt/Sac:CDJM/bXntAh+nhZoqQEHvVIzJPz//Dc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 368 jjruejn.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\jjruejn.exe 7aaf257fa8f11d4750fb97723a2f21263940ddcdbda2f87bc3eeb33801c22404.exe File created C:\PROGRA~3\Mozilla\segfnra.dll jjruejn.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 980 wrote to memory of 368 980 taskeng.exe 27 PID 980 wrote to memory of 368 980 taskeng.exe 27 PID 980 wrote to memory of 368 980 taskeng.exe 27 PID 980 wrote to memory of 368 980 taskeng.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\7aaf257fa8f11d4750fb97723a2f21263940ddcdbda2f87bc3eeb33801c22404.exe"C:\Users\Admin\AppData\Local\Temp\7aaf257fa8f11d4750fb97723a2f21263940ddcdbda2f87bc3eeb33801c22404.exe"1⤵
- Drops file in Program Files directory
PID:2032
-
C:\Windows\system32\taskeng.exetaskeng.exe {3116E96D-3DA9-4A2F-9D48-8057014C333D} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:980 -
C:\PROGRA~3\Mozilla\jjruejn.exeC:\PROGRA~3\Mozilla\jjruejn.exe -npivonl2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:368
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
347KB
MD55386127d0d419b1eb5a10c8a756bf390
SHA1d8b458ea521f1b91607d307dbbea4c3d8f661624
SHA256479d06f0bb647f1a3f66649cf622b432271c90ead509b55a124c6d6d0fccb2ef
SHA512e9efaee749ae73013c6ccc2d11607c53ccc049abdbe71d97eabf8d2a66caceb6c9f57902d7a914abe3bd1c299c55056254bc71f5bfdc3f994f28e3f5bff7f00a
-
Filesize
347KB
MD55386127d0d419b1eb5a10c8a756bf390
SHA1d8b458ea521f1b91607d307dbbea4c3d8f661624
SHA256479d06f0bb647f1a3f66649cf622b432271c90ead509b55a124c6d6d0fccb2ef
SHA512e9efaee749ae73013c6ccc2d11607c53ccc049abdbe71d97eabf8d2a66caceb6c9f57902d7a914abe3bd1c299c55056254bc71f5bfdc3f994f28e3f5bff7f00a