Analysis
-
max time kernel
39s -
max time network
77s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20-10-2022 08:56
Static task
static1
Behavioral task
behavioral1
Sample
442fb4b398db3dcd79b0f3bd78cef56685dd2e5add37b4edab5d4762912f964c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
442fb4b398db3dcd79b0f3bd78cef56685dd2e5add37b4edab5d4762912f964c.exe
Resource
win10v2004-20220901-en
General
-
Target
442fb4b398db3dcd79b0f3bd78cef56685dd2e5add37b4edab5d4762912f964c.exe
-
Size
161KB
-
MD5
80b1967d1e4da878088b7cbb4158bf20
-
SHA1
f68ec4ed09d2971908fbc6e88af49bf35348f161
-
SHA256
442fb4b398db3dcd79b0f3bd78cef56685dd2e5add37b4edab5d4762912f964c
-
SHA512
e63626f5a58ee58055048e1af6c56f6223ba01f126399ab2766e6b66ba7b2fb6e413218ec25f4d3971698f388a6de1569760bdc69d431680a462d8f403efaeae
-
SSDEEP
3072:CDUp8yetaIBOvnMqllHQmkKtaY/JB/KMu0oS2rOaQn3OOXluZLq290LAP/0y+ntS:CDJVazMKV31FdaQvXluxqU+A/0y+ntS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 772 jwufxge.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\jwufxge.exe 442fb4b398db3dcd79b0f3bd78cef56685dd2e5add37b4edab5d4762912f964c.exe File created C:\PROGRA~3\Mozilla\hvkykah.dll jwufxge.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1780 wrote to memory of 772 1780 taskeng.exe 27 PID 1780 wrote to memory of 772 1780 taskeng.exe 27 PID 1780 wrote to memory of 772 1780 taskeng.exe 27 PID 1780 wrote to memory of 772 1780 taskeng.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\442fb4b398db3dcd79b0f3bd78cef56685dd2e5add37b4edab5d4762912f964c.exe"C:\Users\Admin\AppData\Local\Temp\442fb4b398db3dcd79b0f3bd78cef56685dd2e5add37b4edab5d4762912f964c.exe"1⤵
- Drops file in Program Files directory
PID:1016
-
C:\Windows\system32\taskeng.exetaskeng.exe {22F7CB01-78B2-499B-A333-3BBC8D273E07} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\PROGRA~3\Mozilla\jwufxge.exeC:\PROGRA~3\Mozilla\jwufxge.exe -kqepohf2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:772
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
161KB
MD5ec282c0ae9a4a91acf762fb3f320da31
SHA19a27dd8d9f10f208010381b361e3d8a5791b6591
SHA256eafa29d90143bf67a6b220c592e72c1008484ca6e5d4aa1354c925876306942f
SHA512ff6c9781a4a2db916d75d2f426e4a7ddd1c687aa379701e94db25745e40295b108f5100124358d8f3df11121c1780e0cf7d40fa1c6aeda0c02bf4460bc719374
-
Filesize
161KB
MD5ec282c0ae9a4a91acf762fb3f320da31
SHA19a27dd8d9f10f208010381b361e3d8a5791b6591
SHA256eafa29d90143bf67a6b220c592e72c1008484ca6e5d4aa1354c925876306942f
SHA512ff6c9781a4a2db916d75d2f426e4a7ddd1c687aa379701e94db25745e40295b108f5100124358d8f3df11121c1780e0cf7d40fa1c6aeda0c02bf4460bc719374