Analysis
-
max time kernel
53s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 17:23
Static task
static1
Behavioral task
behavioral1
Sample
f715637e52886a1874894fa732009a7dae39ea2d37fa0a795393a128531dc888.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f715637e52886a1874894fa732009a7dae39ea2d37fa0a795393a128531dc888.exe
Resource
win10v2004-20220812-en
General
-
Target
f715637e52886a1874894fa732009a7dae39ea2d37fa0a795393a128531dc888.exe
-
Size
173KB
-
MD5
6d140a3f1a156435e177a5c2a7e60ef5
-
SHA1
fd3c0dc497f6b167414d2796e52d3909f9305f08
-
SHA256
f715637e52886a1874894fa732009a7dae39ea2d37fa0a795393a128531dc888
-
SHA512
894860dfe79b31ab8ae699d307cfbf90b9720bbc64f5154d91c7b304781514a479075bb294e06356fc23f204b35433084cf395698fd0dc069cbab9e1cdab4ab5
-
SSDEEP
3072:pidj6ShhYRa3SXjF/HvD9hQU7OCyIjAYxRwmdPkmkWt+3t97SVKmHkAJbbvAKclk:pEjpvYc3YJ/HvD9hTKCyI7TwmdMlL99a
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 624 nswitkh.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\zgooxfa.dll nswitkh.exe File created C:\PROGRA~3\Mozilla\nswitkh.exe f715637e52886a1874894fa732009a7dae39ea2d37fa0a795393a128531dc888.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1496 wrote to memory of 624 1496 taskeng.exe 29 PID 1496 wrote to memory of 624 1496 taskeng.exe 29 PID 1496 wrote to memory of 624 1496 taskeng.exe 29 PID 1496 wrote to memory of 624 1496 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\f715637e52886a1874894fa732009a7dae39ea2d37fa0a795393a128531dc888.exe"C:\Users\Admin\AppData\Local\Temp\f715637e52886a1874894fa732009a7dae39ea2d37fa0a795393a128531dc888.exe"1⤵
- Drops file in Program Files directory
PID:2004
-
C:\Windows\system32\taskeng.exetaskeng.exe {15CD5328-37FC-4AD2-9F4A-B007E8C8A588} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\PROGRA~3\Mozilla\nswitkh.exeC:\PROGRA~3\Mozilla\nswitkh.exe -vhgoixm2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:624
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173KB
MD57e61d5584482bd0a795c10c7237365cb
SHA1b29d0de4f92f0eb5fd3bb7399fa92022270db700
SHA256d584cee7c479800a9f820e69818d58300f9f7ce1654fee1c4a19b4a7d342f12d
SHA512bce204c410a50895da3acbede79322d80bb23bafe2de7f5c604ba280a4d19669c10007d4624c89693f5ce626b25d1d78bbcc2621c9ff02dda5359569511b4780
-
Filesize
173KB
MD57e61d5584482bd0a795c10c7237365cb
SHA1b29d0de4f92f0eb5fd3bb7399fa92022270db700
SHA256d584cee7c479800a9f820e69818d58300f9f7ce1654fee1c4a19b4a7d342f12d
SHA512bce204c410a50895da3acbede79322d80bb23bafe2de7f5c604ba280a4d19669c10007d4624c89693f5ce626b25d1d78bbcc2621c9ff02dda5359569511b4780