Analysis

  • max time kernel
    48s
  • max time network
    53s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    29-10-2022 22:26

General

  • Target

    7d9b3402ab0a58fd1e36c07fe92502b15c195e697f3a4c492d08798c9dd872f1.exe

  • Size

    144KB

  • MD5

    5411b3b45ec58d39c8572f84f0caf520

  • SHA1

    e6ae9cb89c9c889435f3c991f607785cc7305daa

  • SHA256

    7d9b3402ab0a58fd1e36c07fe92502b15c195e697f3a4c492d08798c9dd872f1

  • SHA512

    dbd72c38f1e91c4ac7051e2e58d70efcbfe17f2916fcc44db0079c471d21503e0a821017b4c779d4bdac28ba6b0de4b0d62253893ebd43ce49c3d51fe3b7a52b

  • SSDEEP

    3072:BO8vGaQ3xPFO6yQWSvAtZJoYIXp0Tr14bAHK3cd/A:BO8+aqtLy2vA7eYIX2J4a8cdY

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies AppInit DLL entries 2 TTPs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d9b3402ab0a58fd1e36c07fe92502b15c195e697f3a4c492d08798c9dd872f1.exe
    "C:\Users\Admin\AppData\Local\Temp\7d9b3402ab0a58fd1e36c07fe92502b15c195e697f3a4c492d08798c9dd872f1.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1364
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {981D5DE6-BE12-40F8-9170-E01C780BC55F} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1168
    • C:\PROGRA~3\Mozilla\jjruejn.exe
      C:\PROGRA~3\Mozilla\jjruejn.exe -npivonl
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:1732

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~3\Mozilla\jjruejn.exe

    Filesize

    144KB

    MD5

    b52e90b04ff2d3c356eb1ef82d410081

    SHA1

    22a252bc14ba63ee681193e71619cf3a3d7c26c5

    SHA256

    99ed4904909c3a78d63e83ac608fcbe9ca7ac16ed1dba29b04b4d0e54da3a82c

    SHA512

    2741ac98a180929ef2eab5d0db42049c82279d747e6dd1aba0cbd3e488291c23b33dd46fd1560b5f342af2a2f359bcf4fb464d7a9df439ab46c37d56cc9986e5

  • C:\PROGRA~3\Mozilla\jjruejn.exe

    Filesize

    144KB

    MD5

    b52e90b04ff2d3c356eb1ef82d410081

    SHA1

    22a252bc14ba63ee681193e71619cf3a3d7c26c5

    SHA256

    99ed4904909c3a78d63e83ac608fcbe9ca7ac16ed1dba29b04b4d0e54da3a82c

    SHA512

    2741ac98a180929ef2eab5d0db42049c82279d747e6dd1aba0cbd3e488291c23b33dd46fd1560b5f342af2a2f359bcf4fb464d7a9df439ab46c37d56cc9986e5

  • memory/1364-54-0x0000000075091000-0x0000000075093000-memory.dmp

    Filesize

    8KB

  • memory/1364-55-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/1364-56-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/1364-59-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/1364-60-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/1732-65-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/1732-69-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/1732-70-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB