Analysis
-
max time kernel
48s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29-10-2022 22:26
Static task
static1
Behavioral task
behavioral1
Sample
7d9b3402ab0a58fd1e36c07fe92502b15c195e697f3a4c492d08798c9dd872f1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7d9b3402ab0a58fd1e36c07fe92502b15c195e697f3a4c492d08798c9dd872f1.exe
Resource
win10v2004-20220812-en
General
-
Target
7d9b3402ab0a58fd1e36c07fe92502b15c195e697f3a4c492d08798c9dd872f1.exe
-
Size
144KB
-
MD5
5411b3b45ec58d39c8572f84f0caf520
-
SHA1
e6ae9cb89c9c889435f3c991f607785cc7305daa
-
SHA256
7d9b3402ab0a58fd1e36c07fe92502b15c195e697f3a4c492d08798c9dd872f1
-
SHA512
dbd72c38f1e91c4ac7051e2e58d70efcbfe17f2916fcc44db0079c471d21503e0a821017b4c779d4bdac28ba6b0de4b0d62253893ebd43ce49c3d51fe3b7a52b
-
SSDEEP
3072:BO8vGaQ3xPFO6yQWSvAtZJoYIXp0Tr14bAHK3cd/A:BO8+aqtLy2vA7eYIX2J4a8cdY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1732 jjruejn.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\segfnra.dll jjruejn.exe File created C:\PROGRA~3\Mozilla\jjruejn.exe 7d9b3402ab0a58fd1e36c07fe92502b15c195e697f3a4c492d08798c9dd872f1.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1168 wrote to memory of 1732 1168 taskeng.exe 27 PID 1168 wrote to memory of 1732 1168 taskeng.exe 27 PID 1168 wrote to memory of 1732 1168 taskeng.exe 27 PID 1168 wrote to memory of 1732 1168 taskeng.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d9b3402ab0a58fd1e36c07fe92502b15c195e697f3a4c492d08798c9dd872f1.exe"C:\Users\Admin\AppData\Local\Temp\7d9b3402ab0a58fd1e36c07fe92502b15c195e697f3a4c492d08798c9dd872f1.exe"1⤵
- Drops file in Program Files directory
PID:1364
-
C:\Windows\system32\taskeng.exetaskeng.exe {981D5DE6-BE12-40F8-9170-E01C780BC55F} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\PROGRA~3\Mozilla\jjruejn.exeC:\PROGRA~3\Mozilla\jjruejn.exe -npivonl2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1732
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144KB
MD5b52e90b04ff2d3c356eb1ef82d410081
SHA122a252bc14ba63ee681193e71619cf3a3d7c26c5
SHA25699ed4904909c3a78d63e83ac608fcbe9ca7ac16ed1dba29b04b4d0e54da3a82c
SHA5122741ac98a180929ef2eab5d0db42049c82279d747e6dd1aba0cbd3e488291c23b33dd46fd1560b5f342af2a2f359bcf4fb464d7a9df439ab46c37d56cc9986e5
-
Filesize
144KB
MD5b52e90b04ff2d3c356eb1ef82d410081
SHA122a252bc14ba63ee681193e71619cf3a3d7c26c5
SHA25699ed4904909c3a78d63e83ac608fcbe9ca7ac16ed1dba29b04b4d0e54da3a82c
SHA5122741ac98a180929ef2eab5d0db42049c82279d747e6dd1aba0cbd3e488291c23b33dd46fd1560b5f342af2a2f359bcf4fb464d7a9df439ab46c37d56cc9986e5