Analysis
-
max time kernel
108s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20-10-2022 08:39
Static task
static1
Behavioral task
behavioral1
Sample
7299266a1b444ebb1bbb00870c84ad6a7c0facfb91ad8bec7ffbd5db9effca09.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7299266a1b444ebb1bbb00870c84ad6a7c0facfb91ad8bec7ffbd5db9effca09.exe
Resource
win10v2004-20220812-en
General
-
Target
7299266a1b444ebb1bbb00870c84ad6a7c0facfb91ad8bec7ffbd5db9effca09.exe
-
Size
221KB
-
MD5
4c461e1277eb548f02830c9c89413ca0
-
SHA1
42532ea562ef4caa24f8fc46bb79427471640717
-
SHA256
7299266a1b444ebb1bbb00870c84ad6a7c0facfb91ad8bec7ffbd5db9effca09
-
SHA512
49f56c2b93885fa686151fecebb4ed789e7dd126bbe9e03d470043356010b3dbe78504d78aadfbbe7065b4f8beb0606bbfe3a518ce2502372cd00e43aba84392
-
SSDEEP
3072:B4CgWgTsDAJJRjOV2/pwb5ryT5tlDhB2IFTLFZhh2D+0caj3kyRAC6f94FtRFdaY:B4Cg3JJF35tlDhB2Cn9oz6fYtRFV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 900 nswitkh.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\zgooxfa.dll nswitkh.exe File created C:\PROGRA~3\Mozilla\nswitkh.exe 7299266a1b444ebb1bbb00870c84ad6a7c0facfb91ad8bec7ffbd5db9effca09.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1060 7299266a1b444ebb1bbb00870c84ad6a7c0facfb91ad8bec7ffbd5db9effca09.exe 900 nswitkh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1904 wrote to memory of 900 1904 taskeng.exe 28 PID 1904 wrote to memory of 900 1904 taskeng.exe 28 PID 1904 wrote to memory of 900 1904 taskeng.exe 28 PID 1904 wrote to memory of 900 1904 taskeng.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7299266a1b444ebb1bbb00870c84ad6a7c0facfb91ad8bec7ffbd5db9effca09.exe"C:\Users\Admin\AppData\Local\Temp\7299266a1b444ebb1bbb00870c84ad6a7c0facfb91ad8bec7ffbd5db9effca09.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1060
-
C:\Windows\system32\taskeng.exetaskeng.exe {80335930-38A0-4488-A025-53E09E70A744} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\PROGRA~3\Mozilla\nswitkh.exeC:\PROGRA~3\Mozilla\nswitkh.exe -vhgoixm2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:900
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
221KB
MD5ef118c598e5a7828983e745d75622b44
SHA1caed5fbe4832af119dc43d8a7fe64b214ccaa701
SHA256682ad2789b1b39a525f48733c64a1e3da0601bd4578bbe2685a28a8371fe1414
SHA5124d8204484183330de327b5eae4405040b281b6a4bdb74cc822066b7755d65e3967c1206abae14ee6e7d76017fbdce02191c79894b23682acbddda585c9f82eed
-
Filesize
221KB
MD5ef118c598e5a7828983e745d75622b44
SHA1caed5fbe4832af119dc43d8a7fe64b214ccaa701
SHA256682ad2789b1b39a525f48733c64a1e3da0601bd4578bbe2685a28a8371fe1414
SHA5124d8204484183330de327b5eae4405040b281b6a4bdb74cc822066b7755d65e3967c1206abae14ee6e7d76017fbdce02191c79894b23682acbddda585c9f82eed