Analysis
-
max time kernel
33s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 04:56
Static task
static1
Behavioral task
behavioral1
Sample
3d2bd3caed6ee2becc904125b65ae844f9c0836abfec2ccb3ba01e89d8f79876.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3d2bd3caed6ee2becc904125b65ae844f9c0836abfec2ccb3ba01e89d8f79876.exe
Resource
win10v2004-20220901-en
General
-
Target
3d2bd3caed6ee2becc904125b65ae844f9c0836abfec2ccb3ba01e89d8f79876.exe
-
Size
222KB
-
MD5
59745df1a6e1fee6eac597faac149350
-
SHA1
1ad70a654728128885f6a07a5af7d0dd6b17aa67
-
SHA256
3d2bd3caed6ee2becc904125b65ae844f9c0836abfec2ccb3ba01e89d8f79876
-
SHA512
ad8010ca82577666dec6818797addbfeb9404e6cfe3bfd72f3c671237d3919b4ce56f5f7b7c4dd01eddacd37c660bff97fa0dbb3e79f189ab63ca2659401c039
-
SSDEEP
3072:dt8wWP9K8zfINLZmEg7xO7NlbylZ5y3ady1U8MsxbCMjqc0o4a:dt8L9KWQNkEbL2lMu8pxT8w
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1420 jwufxge.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\jwufxge.exe 3d2bd3caed6ee2becc904125b65ae844f9c0836abfec2ccb3ba01e89d8f79876.exe File created C:\PROGRA~3\Mozilla\hvkykah.dll jwufxge.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1952 3d2bd3caed6ee2becc904125b65ae844f9c0836abfec2ccb3ba01e89d8f79876.exe 1420 jwufxge.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1936 wrote to memory of 1420 1936 taskeng.exe 27 PID 1936 wrote to memory of 1420 1936 taskeng.exe 27 PID 1936 wrote to memory of 1420 1936 taskeng.exe 27 PID 1936 wrote to memory of 1420 1936 taskeng.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d2bd3caed6ee2becc904125b65ae844f9c0836abfec2ccb3ba01e89d8f79876.exe"C:\Users\Admin\AppData\Local\Temp\3d2bd3caed6ee2becc904125b65ae844f9c0836abfec2ccb3ba01e89d8f79876.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1952
-
C:\Windows\system32\taskeng.exetaskeng.exe {2A86CF48-86DC-4CEA-BDB4-BE1884E3C0BC} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\PROGRA~3\Mozilla\jwufxge.exeC:\PROGRA~3\Mozilla\jwufxge.exe -kqepohf2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1420
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
222KB
MD59e2c1541713a5e1465e5451c09f69728
SHA149efe0342745446a40b6399f74d53f50a58735a0
SHA256a4af8b2ce80ecdd6b5aeab7d9c4596e4c8089b7e5754ee8c3c3b50feaefde540
SHA512e5544bccd2bf6a673658a7518b7a471f70aeccfd153b649a3517c04660a3db7d002d95ccef8598ae06a8e22aeb39f8bc40762f6913d3b7546c300bbe3da9245a
-
Filesize
222KB
MD59e2c1541713a5e1465e5451c09f69728
SHA149efe0342745446a40b6399f74d53f50a58735a0
SHA256a4af8b2ce80ecdd6b5aeab7d9c4596e4c8089b7e5754ee8c3c3b50feaefde540
SHA512e5544bccd2bf6a673658a7518b7a471f70aeccfd153b649a3517c04660a3db7d002d95ccef8598ae06a8e22aeb39f8bc40762f6913d3b7546c300bbe3da9245a