Analysis
-
max time kernel
36s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 14:25
Static task
static1
Behavioral task
behavioral1
Sample
191ffc83bdb5fd0f6412e0ea9f390e566763e1d9e26b7423d5d6d9b80eb126bc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
191ffc83bdb5fd0f6412e0ea9f390e566763e1d9e26b7423d5d6d9b80eb126bc.exe
Resource
win10v2004-20220901-en
General
-
Target
191ffc83bdb5fd0f6412e0ea9f390e566763e1d9e26b7423d5d6d9b80eb126bc.exe
-
Size
230KB
-
MD5
44560420d3c4b7a141105b8a0a6836d2
-
SHA1
895851cef4a4e0bea65ccb0a07bcc42179d21a70
-
SHA256
191ffc83bdb5fd0f6412e0ea9f390e566763e1d9e26b7423d5d6d9b80eb126bc
-
SHA512
06631921cd769f9e4f952872fb995a2383ab830070d0706c41b8bfcbe5dce4de956da21154d74b7f9e9840c2eccdd6c18a0e879e46f3e4d3f9d2e69e6c37d1f9
-
SSDEEP
3072:oTNkXHfvl0awuW22s1z/7zLou7YPUpUld9tSMsCNjqaoMrV2eEwSXsHl:o2fvloM1T7r7YMpRBMVB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1440 sgfgrig.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\ogcwmgm.dll sgfgrig.exe File created C:\PROGRA~3\Mozilla\sgfgrig.exe 191ffc83bdb5fd0f6412e0ea9f390e566763e1d9e26b7423d5d6d9b80eb126bc.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1996 191ffc83bdb5fd0f6412e0ea9f390e566763e1d9e26b7423d5d6d9b80eb126bc.exe 1440 sgfgrig.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 612 wrote to memory of 1440 612 taskeng.exe 28 PID 612 wrote to memory of 1440 612 taskeng.exe 28 PID 612 wrote to memory of 1440 612 taskeng.exe 28 PID 612 wrote to memory of 1440 612 taskeng.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\191ffc83bdb5fd0f6412e0ea9f390e566763e1d9e26b7423d5d6d9b80eb126bc.exe"C:\Users\Admin\AppData\Local\Temp\191ffc83bdb5fd0f6412e0ea9f390e566763e1d9e26b7423d5d6d9b80eb126bc.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1996
-
C:\Windows\system32\taskeng.exetaskeng.exe {0039E18C-9650-4305-AFA3-D1BB38F144D9} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:612 -
C:\PROGRA~3\Mozilla\sgfgrig.exeC:\PROGRA~3\Mozilla\sgfgrig.exe -smuvcxh2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1440
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
230KB
MD5806882cabfdcfead599027267893288d
SHA1112179bc3d25996549b620d787743a6b422e978b
SHA2566e2d2c8b2e8d8ffd636378b345f784bbcd17d562bae5edd57824ac71af57ee8b
SHA51259027faa22decf72b38386f2873c2ea52339bc7ce5a0c00e4c3461c1e8ca7ead3bbe2720a2a41bd6061f60cdb03458b6dee288ddf0042273f22b9ce105c54df8
-
Filesize
230KB
MD5806882cabfdcfead599027267893288d
SHA1112179bc3d25996549b620d787743a6b422e978b
SHA2566e2d2c8b2e8d8ffd636378b345f784bbcd17d562bae5edd57824ac71af57ee8b
SHA51259027faa22decf72b38386f2873c2ea52339bc7ce5a0c00e4c3461c1e8ca7ead3bbe2720a2a41bd6061f60cdb03458b6dee288ddf0042273f22b9ce105c54df8