Analysis
-
max time kernel
54s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 22:57
Static task
static1
Behavioral task
behavioral1
Sample
23b1109a9683c25ef153c1efbf78093fd46aa75fe22d2ebf207b229a4b025018.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
23b1109a9683c25ef153c1efbf78093fd46aa75fe22d2ebf207b229a4b025018.exe
Resource
win10v2004-20220812-en
General
-
Target
23b1109a9683c25ef153c1efbf78093fd46aa75fe22d2ebf207b229a4b025018.exe
-
Size
173KB
-
MD5
4d0f4d5e943ed4f7f611174eaebb4230
-
SHA1
d8e06abad3796a4d904350e0045a17f2feb22794
-
SHA256
23b1109a9683c25ef153c1efbf78093fd46aa75fe22d2ebf207b229a4b025018
-
SHA512
9ff81f5849e15181b78978df36152f8338fa563579cab06e309743b80aab43b0660e3a1669d958b28f60b193693cbdbdf0e82d9d9541139ef747094d13145320
-
SSDEEP
3072:olLCHXaCdhv4DVwveIa1PU1hN6OhFHU1XsQoTN3uDuFdUsu1oME/w:4Cv3W71PUJ6OhFHU+QSNHR7w
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1492 sgfgrig.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\sgfgrig.exe 23b1109a9683c25ef153c1efbf78093fd46aa75fe22d2ebf207b229a4b025018.exe File created C:\PROGRA~3\Mozilla\ogcwmgm.dll sgfgrig.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier 23b1109a9683c25ef153c1efbf78093fd46aa75fe22d2ebf207b229a4b025018.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier sgfgrig.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1220 wrote to memory of 1492 1220 taskeng.exe 29 PID 1220 wrote to memory of 1492 1220 taskeng.exe 29 PID 1220 wrote to memory of 1492 1220 taskeng.exe 29 PID 1220 wrote to memory of 1492 1220 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\23b1109a9683c25ef153c1efbf78093fd46aa75fe22d2ebf207b229a4b025018.exe"C:\Users\Admin\AppData\Local\Temp\23b1109a9683c25ef153c1efbf78093fd46aa75fe22d2ebf207b229a4b025018.exe"1⤵
- Drops file in Program Files directory
- Enumerates system info in registry
PID:1948
-
C:\Windows\system32\taskeng.exetaskeng.exe {2BB7F528-FA61-4242-846A-A6D2211E971B} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\PROGRA~3\Mozilla\sgfgrig.exeC:\PROGRA~3\Mozilla\sgfgrig.exe -smuvcxh2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Enumerates system info in registry
PID:1492
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173KB
MD588749594428b82c3315fa74f8fb65489
SHA1b95459a10b333efdbdcce748909298290cbc8714
SHA25644db64c25f9ac740641452b9791c0f4fda040da50c0c7a4ac7c23a971a263409
SHA5122de966e8f50d01f530aa2222ba3c7cc31b8a0bc56e4cb6792af193e27cddf301aae995ed4c346dc46c1ed9b7b7a1407ac21592b0f18fe4781eca1510d87be66f
-
Filesize
173KB
MD588749594428b82c3315fa74f8fb65489
SHA1b95459a10b333efdbdcce748909298290cbc8714
SHA25644db64c25f9ac740641452b9791c0f4fda040da50c0c7a4ac7c23a971a263409
SHA5122de966e8f50d01f530aa2222ba3c7cc31b8a0bc56e4cb6792af193e27cddf301aae995ed4c346dc46c1ed9b7b7a1407ac21592b0f18fe4781eca1510d87be66f