Analysis
-
max time kernel
42s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 08:19
Static task
static1
Behavioral task
behavioral1
Sample
aa8897704b8e8525c2accaf3678a8dcefbdf80a484b5faf1a0987cc856e93702.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
aa8897704b8e8525c2accaf3678a8dcefbdf80a484b5faf1a0987cc856e93702.exe
Resource
win10v2004-20220812-en
General
-
Target
aa8897704b8e8525c2accaf3678a8dcefbdf80a484b5faf1a0987cc856e93702.exe
-
Size
141KB
-
MD5
78e80fc33a8ef1e8e8b84d40b20f3c30
-
SHA1
e4e2948663283929a955b9d95d6492ead1a6e3c5
-
SHA256
aa8897704b8e8525c2accaf3678a8dcefbdf80a484b5faf1a0987cc856e93702
-
SHA512
cf47e80c1c8d7ef1d818e6852d6766158eeac9f3183e6fcdd0aa3500c973dc7aa0d596c8514dcf0d1ff24b7399b0e87421e6e91c7379aac578c70f51ad26d5c0
-
SSDEEP
3072:T6/T4OO+Ig7j1RKBvxf5GQUCQB0vpe+cD0bCVUhP/Ro:sEjFKj1wh5GQLksxcDJVqP/u
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1932 jjruejn.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\jjruejn.exe aa8897704b8e8525c2accaf3678a8dcefbdf80a484b5faf1a0987cc856e93702.exe File created C:\PROGRA~3\Mozilla\segfnra.dll jjruejn.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 768 wrote to memory of 1932 768 taskeng.exe 28 PID 768 wrote to memory of 1932 768 taskeng.exe 28 PID 768 wrote to memory of 1932 768 taskeng.exe 28 PID 768 wrote to memory of 1932 768 taskeng.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa8897704b8e8525c2accaf3678a8dcefbdf80a484b5faf1a0987cc856e93702.exe"C:\Users\Admin\AppData\Local\Temp\aa8897704b8e8525c2accaf3678a8dcefbdf80a484b5faf1a0987cc856e93702.exe"1⤵
- Drops file in Program Files directory
PID:1516
-
C:\Windows\system32\taskeng.exetaskeng.exe {8B9A0BBF-9081-48C3-981D-56B5C84A2657} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:768 -
C:\PROGRA~3\Mozilla\jjruejn.exeC:\PROGRA~3\Mozilla\jjruejn.exe -npivonl2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1932
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
141KB
MD555d6b528d5e09935658bfdefddd7ab03
SHA125c3f5f7079680204ca7830ec1cd4b1111694127
SHA256eba4788f29fa59757096ea13223a96481b3ebabf76576b56b3df057fd3dfe9b2
SHA512c3f070e731a862983ba2385a4163181ed54fb53a40fdc3f9ba463b91f593061a70fbb6d2fa790859d7efaa34d313ac4c51a4f2ae1f16c0cf8ad71abf0bf4d4b0
-
Filesize
141KB
MD555d6b528d5e09935658bfdefddd7ab03
SHA125c3f5f7079680204ca7830ec1cd4b1111694127
SHA256eba4788f29fa59757096ea13223a96481b3ebabf76576b56b3df057fd3dfe9b2
SHA512c3f070e731a862983ba2385a4163181ed54fb53a40fdc3f9ba463b91f593061a70fbb6d2fa790859d7efaa34d313ac4c51a4f2ae1f16c0cf8ad71abf0bf4d4b0