Analysis
-
max time kernel
57s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11-10-2022 08:12
Static task
static1
Behavioral task
behavioral1
Sample
22dfc353270415cef03388ad14ae5b1c63d3fa58a77e30473dc65e54733ecf73.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
22dfc353270415cef03388ad14ae5b1c63d3fa58a77e30473dc65e54733ecf73.exe
Resource
win10v2004-20220901-en
General
-
Target
22dfc353270415cef03388ad14ae5b1c63d3fa58a77e30473dc65e54733ecf73.exe
-
Size
211KB
-
MD5
69195b26668fda69e91402ff1be7ca20
-
SHA1
7ec9a3b8b9a45a4d15c038dc673f8381a7e186cf
-
SHA256
22dfc353270415cef03388ad14ae5b1c63d3fa58a77e30473dc65e54733ecf73
-
SHA512
43a6ae316c09fd6eddab6fc146d49d3e30fabc477dedae075d8503d27c38fa5f447b7f0b26c28708c49538eced8fff47bc213127a62d1c0c8f0053d7b1c82388
-
SSDEEP
3072:+c/1zMIQ+Q7VLRCYpzPUGmw3ag4afH+q6f15TGzhK1/zmKb:HMf+GVJzPX3ag4+HoLTGzIFmKb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1252 sgfgrig.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\sgfgrig.exe 22dfc353270415cef03388ad14ae5b1c63d3fa58a77e30473dc65e54733ecf73.exe File created C:\PROGRA~3\Mozilla\ogcwmgm.dll sgfgrig.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1800 22dfc353270415cef03388ad14ae5b1c63d3fa58a77e30473dc65e54733ecf73.exe 1252 sgfgrig.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 948 wrote to memory of 1252 948 taskeng.exe 29 PID 948 wrote to memory of 1252 948 taskeng.exe 29 PID 948 wrote to memory of 1252 948 taskeng.exe 29 PID 948 wrote to memory of 1252 948 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\22dfc353270415cef03388ad14ae5b1c63d3fa58a77e30473dc65e54733ecf73.exe"C:\Users\Admin\AppData\Local\Temp\22dfc353270415cef03388ad14ae5b1c63d3fa58a77e30473dc65e54733ecf73.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1800
-
C:\Windows\system32\taskeng.exetaskeng.exe {99AB19B4-A4D1-4EDA-A6FB-F49C6A9B356D} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:948 -
C:\PROGRA~3\Mozilla\sgfgrig.exeC:\PROGRA~3\Mozilla\sgfgrig.exe -smuvcxh2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1252
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD587e0e021f2deac52a2e9dc786f0bd9fd
SHA16a5bfbc7eeabcc8ea486bd77a495db6dcc163084
SHA256b7520393a063790a559c30118dcc4d96e1d7ed617bc0d1af7f3c679bdb280721
SHA5125fd62e2745b6a124d2391f9701a12a30e4766ae0465e7a608828f5f3a9cc4ada64c6735763b95dfdddaa354cec719dc978f100c0fb053b73cbd6d53c0a280f81
-
Filesize
211KB
MD587e0e021f2deac52a2e9dc786f0bd9fd
SHA16a5bfbc7eeabcc8ea486bd77a495db6dcc163084
SHA256b7520393a063790a559c30118dcc4d96e1d7ed617bc0d1af7f3c679bdb280721
SHA5125fd62e2745b6a124d2391f9701a12a30e4766ae0465e7a608828f5f3a9cc4ada64c6735763b95dfdddaa354cec719dc978f100c0fb053b73cbd6d53c0a280f81