Analysis
-
max time kernel
57s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-10-2022 22:06
Static task
static1
Behavioral task
behavioral1
Sample
9ed43b21352259b519bce8406c6054106329d736856c1ddb8f0eb37ea186992a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9ed43b21352259b519bce8406c6054106329d736856c1ddb8f0eb37ea186992a.exe
Resource
win10v2004-20220812-en
General
-
Target
9ed43b21352259b519bce8406c6054106329d736856c1ddb8f0eb37ea186992a.exe
-
Size
131KB
-
MD5
91f9a9168fa484fdd9911e7108ec6200
-
SHA1
8a0dc260c11910f74158f41c14fd60cfef3b40ba
-
SHA256
9ed43b21352259b519bce8406c6054106329d736856c1ddb8f0eb37ea186992a
-
SHA512
d730f3b8234048f753d4ecede710e23ff22711b769354956c13ba5ac3b2aa0983a5e50b1e8ac75584f7eea3575530dd3c0b5b7c8d8cacd9ff822708e121669e1
-
SSDEEP
3072:XDn7CoWd07esc3BUWGldDymdnZylqQFB07N:fCoWd0kSWSzZc1B07N
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1748 nswitkh.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\zgooxfa.dll nswitkh.exe File created C:\PROGRA~3\Mozilla\nswitkh.exe 9ed43b21352259b519bce8406c6054106329d736856c1ddb8f0eb37ea186992a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1376 wrote to memory of 1748 1376 taskeng.exe 28 PID 1376 wrote to memory of 1748 1376 taskeng.exe 28 PID 1376 wrote to memory of 1748 1376 taskeng.exe 28 PID 1376 wrote to memory of 1748 1376 taskeng.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ed43b21352259b519bce8406c6054106329d736856c1ddb8f0eb37ea186992a.exe"C:\Users\Admin\AppData\Local\Temp\9ed43b21352259b519bce8406c6054106329d736856c1ddb8f0eb37ea186992a.exe"1⤵
- Drops file in Program Files directory
PID:908
-
C:\Windows\system32\taskeng.exetaskeng.exe {E8514208-E8DE-4A86-86A3-94A7A84EF02B} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\PROGRA~3\Mozilla\nswitkh.exeC:\PROGRA~3\Mozilla\nswitkh.exe -vhgoixm2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1748
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
131KB
MD507de938666ca62aec0139251eb749899
SHA10133451c4a65fa0bc855317e75103d15c1ab0e06
SHA2567be3807781e69840ef4d6f5a960c70d5c9eb67b8ec4cb56ef48dc5bf1bf3eb9f
SHA512afd59dcef61bfb38a8d6367221ed2b74af5afc66e78377089e4a7450a23e049930a9fb4e8d53d61062d42473f7e953f69820aba9d7444fc1aef37e6b5df4b26d
-
Filesize
131KB
MD507de938666ca62aec0139251eb749899
SHA10133451c4a65fa0bc855317e75103d15c1ab0e06
SHA2567be3807781e69840ef4d6f5a960c70d5c9eb67b8ec4cb56ef48dc5bf1bf3eb9f
SHA512afd59dcef61bfb38a8d6367221ed2b74af5afc66e78377089e4a7450a23e049930a9fb4e8d53d61062d42473f7e953f69820aba9d7444fc1aef37e6b5df4b26d