Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11-10-2022 08:10
Static task
static1
Behavioral task
behavioral1
Sample
2788b506637c89ee4b1dc6ecef1e46351084478cea1a91d08c7ea1cc2d464867.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2788b506637c89ee4b1dc6ecef1e46351084478cea1a91d08c7ea1cc2d464867.exe
Resource
win10v2004-20220812-en
General
-
Target
2788b506637c89ee4b1dc6ecef1e46351084478cea1a91d08c7ea1cc2d464867.exe
-
Size
222KB
-
MD5
78533ae032c54313fec238b20651f290
-
SHA1
bfa5d9ef21ad6ab52458ea26a7d1d75bc84e8bea
-
SHA256
2788b506637c89ee4b1dc6ecef1e46351084478cea1a91d08c7ea1cc2d464867
-
SHA512
e3e39a0fd11a43a63aa1afc6efa44899e74147b0de611ce542b05631fc9bbc220e9a8c60ff44b956cf2c52613af63e3e1bb4e6ac2e3d99966978f599c5e14305
-
SSDEEP
3072:VoC7MKza/Yb+O0vVBcSDrOEMCjSJPwfC/lvOmzn1aDGrX:Vr7rN2vvDrONJ7RRZrX
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 808 sgfgrig.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\sgfgrig.exe 2788b506637c89ee4b1dc6ecef1e46351084478cea1a91d08c7ea1cc2d464867.exe File created C:\PROGRA~3\Mozilla\ogcwmgm.dll sgfgrig.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1336 2788b506637c89ee4b1dc6ecef1e46351084478cea1a91d08c7ea1cc2d464867.exe 808 sgfgrig.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1704 wrote to memory of 808 1704 taskeng.exe 28 PID 1704 wrote to memory of 808 1704 taskeng.exe 28 PID 1704 wrote to memory of 808 1704 taskeng.exe 28 PID 1704 wrote to memory of 808 1704 taskeng.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2788b506637c89ee4b1dc6ecef1e46351084478cea1a91d08c7ea1cc2d464867.exe"C:\Users\Admin\AppData\Local\Temp\2788b506637c89ee4b1dc6ecef1e46351084478cea1a91d08c7ea1cc2d464867.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1336
-
C:\Windows\system32\taskeng.exetaskeng.exe {67CA8C6F-F548-45DA-8FA7-470ABC0DAF98} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\PROGRA~3\Mozilla\sgfgrig.exeC:\PROGRA~3\Mozilla\sgfgrig.exe -smuvcxh2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:808
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
222KB
MD54a6fe2d62929845e517cdebc18802a93
SHA1fec769ff1ff98e5d1b14494494df228e5a82fb66
SHA256770effe42bbdbc9d49d7752fbb51558ea0fc847d77ad14296b598ddd650b5584
SHA512676e62d43018d4ff4c247ccbdcc1a3d82a875322b5ac141f22ede49a1965d6a12e5d515a0fcabae9c9deb197f4dc736ecf8ad9510aaa2e7b17b0ad156baf7e9c
-
Filesize
222KB
MD54a6fe2d62929845e517cdebc18802a93
SHA1fec769ff1ff98e5d1b14494494df228e5a82fb66
SHA256770effe42bbdbc9d49d7752fbb51558ea0fc847d77ad14296b598ddd650b5584
SHA512676e62d43018d4ff4c247ccbdcc1a3d82a875322b5ac141f22ede49a1965d6a12e5d515a0fcabae9c9deb197f4dc736ecf8ad9510aaa2e7b17b0ad156baf7e9c