Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20-10-2022 19:59
Static task
static1
Behavioral task
behavioral1
Sample
849d4b46ae1bc6ce3fa959b30a9f0338a5f6a21c4eaee44da46811326d418c57.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
849d4b46ae1bc6ce3fa959b30a9f0338a5f6a21c4eaee44da46811326d418c57.exe
Resource
win10v2004-20220812-en
General
-
Target
849d4b46ae1bc6ce3fa959b30a9f0338a5f6a21c4eaee44da46811326d418c57.exe
-
Size
156KB
-
MD5
96e059a6fc1885be1094bde412d86640
-
SHA1
931938dccb7ac9c72c6f368ccb2d780b90fbfef6
-
SHA256
849d4b46ae1bc6ce3fa959b30a9f0338a5f6a21c4eaee44da46811326d418c57
-
SHA512
690e4d25a4b9e4d352265c5f00ad44a5768f385317f1353183c4327da01acba2bd325c5ae8fcbd3bd27aac5ce569a19f406aa394da0e6fe08b352cc8bc154601
-
SSDEEP
1536:JKcASE+BqEku1utkZOWD3Gjvs3TfKcLzAFJJsksvaWtmqb3Cb4p8zHMTNch8eCWn:l1BqxuUaKjU3TicAHJsow3zpEENchbB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1284 jjruejn.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\jjruejn.exe 849d4b46ae1bc6ce3fa959b30a9f0338a5f6a21c4eaee44da46811326d418c57.exe File created C:\PROGRA~3\Mozilla\segfnra.dll jjruejn.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1868 wrote to memory of 1284 1868 taskeng.exe 28 PID 1868 wrote to memory of 1284 1868 taskeng.exe 28 PID 1868 wrote to memory of 1284 1868 taskeng.exe 28 PID 1868 wrote to memory of 1284 1868 taskeng.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\849d4b46ae1bc6ce3fa959b30a9f0338a5f6a21c4eaee44da46811326d418c57.exe"C:\Users\Admin\AppData\Local\Temp\849d4b46ae1bc6ce3fa959b30a9f0338a5f6a21c4eaee44da46811326d418c57.exe"1⤵
- Drops file in Program Files directory
PID:1600
-
C:\Windows\system32\taskeng.exetaskeng.exe {22F76AFA-3E76-4AA0-8486-AFFD666B5C1F} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\PROGRA~3\Mozilla\jjruejn.exeC:\PROGRA~3\Mozilla\jjruejn.exe -npivonl2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1284
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD581b14f4fe6ab6624967a9c9b5a227ff2
SHA13be4b63f3bf9687d1770f2faf779a23dd19c4f5d
SHA256c4da6174c1f79d6c2d6be64530d38105321bd8f3517f3e89f51ff9df44e99f07
SHA512739e61b81e818548eb6341a8630ea722595c7df67d238cb5d5fa19bcefcb31e0ce9277fb4c1e069006e364426c866e2accde26854d8e6236ea5f96c035a2b4fc
-
Filesize
156KB
MD581b14f4fe6ab6624967a9c9b5a227ff2
SHA13be4b63f3bf9687d1770f2faf779a23dd19c4f5d
SHA256c4da6174c1f79d6c2d6be64530d38105321bd8f3517f3e89f51ff9df44e99f07
SHA512739e61b81e818548eb6341a8630ea722595c7df67d238cb5d5fa19bcefcb31e0ce9277fb4c1e069006e364426c866e2accde26854d8e6236ea5f96c035a2b4fc