Analysis
-
max time kernel
114s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 09:03
Static task
static1
Behavioral task
behavioral1
Sample
311aed728284c35387049456677fc942df73dece364f5429ea4d6a93029f373c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
311aed728284c35387049456677fc942df73dece364f5429ea4d6a93029f373c.exe
Resource
win10v2004-20220812-en
General
-
Target
311aed728284c35387049456677fc942df73dece364f5429ea4d6a93029f373c.exe
-
Size
140KB
-
MD5
5525ee4fbe3388d241adfa8ac6fadcf0
-
SHA1
3d3c567e97d8cef9eb7ea3159f45374fb02d8491
-
SHA256
311aed728284c35387049456677fc942df73dece364f5429ea4d6a93029f373c
-
SHA512
2a87b105cb1d9f964ef0b515a382317841a4b60d4c30b6c119b645687216b8292193d8f3e5d941c9ab846f66511c4156c2a4464b34dc262381243b1b78e8522d
-
SSDEEP
3072:midj6ShhYRa3Sl3xMTOLuIjAYxRwmdPkmkWt+3t97SVKmg:mEjpvYc3QxMI7TwmdMlL992VKmg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1020 nswitkh.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\nswitkh.exe 311aed728284c35387049456677fc942df73dece364f5429ea4d6a93029f373c.exe File created C:\PROGRA~3\Mozilla\zgooxfa.dll nswitkh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1116 wrote to memory of 1020 1116 taskeng.exe 29 PID 1116 wrote to memory of 1020 1116 taskeng.exe 29 PID 1116 wrote to memory of 1020 1116 taskeng.exe 29 PID 1116 wrote to memory of 1020 1116 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\311aed728284c35387049456677fc942df73dece364f5429ea4d6a93029f373c.exe"C:\Users\Admin\AppData\Local\Temp\311aed728284c35387049456677fc942df73dece364f5429ea4d6a93029f373c.exe"1⤵
- Drops file in Program Files directory
PID:1928
-
C:\Windows\system32\taskeng.exetaskeng.exe {B22488B7-5A8F-4C04-916F-5BDFAB68C106} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\PROGRA~3\Mozilla\nswitkh.exeC:\PROGRA~3\Mozilla\nswitkh.exe -vhgoixm2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1020
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD59ddc987e6525d1972b7b2adfeb689966
SHA134725058ac4c821a28e769c8c241bc1e488c82de
SHA256db5041492a9dd83893632399bfc8821f665a0310a3fc872f40b51ac9ef370fc2
SHA512df4f850e28e18782ba2aa5c1444168410dfce322c0f1c7d98b60bbc9c77270452c7f68db3c8a17db9d4a192b707b505cb7cc01ff2d3dd246ce69d3bdbeaace4a
-
Filesize
140KB
MD59ddc987e6525d1972b7b2adfeb689966
SHA134725058ac4c821a28e769c8c241bc1e488c82de
SHA256db5041492a9dd83893632399bfc8821f665a0310a3fc872f40b51ac9ef370fc2
SHA512df4f850e28e18782ba2aa5c1444168410dfce322c0f1c7d98b60bbc9c77270452c7f68db3c8a17db9d4a192b707b505cb7cc01ff2d3dd246ce69d3bdbeaace4a