Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-10-2022 13:20
Static task
static1
Behavioral task
behavioral1
Sample
2b1aeea167b5a914b2f2168400ad6fd49bbf9111d56cf6a483a4dd58ea6947eb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2b1aeea167b5a914b2f2168400ad6fd49bbf9111d56cf6a483a4dd58ea6947eb.exe
Resource
win10v2004-20220812-en
General
-
Target
2b1aeea167b5a914b2f2168400ad6fd49bbf9111d56cf6a483a4dd58ea6947eb.exe
-
Size
170KB
-
MD5
a2a50dc44ff32e92b26172d1d3ad67e0
-
SHA1
7a2dd77e9021580d840cfbcfc61db24cbeb7653e
-
SHA256
2b1aeea167b5a914b2f2168400ad6fd49bbf9111d56cf6a483a4dd58ea6947eb
-
SHA512
3194e0fef49a4cfa832b8f8297a04df87247425dd96eaf7e6d77e0b0f2f5306e52a7eeadf035f7674bb66976f086946a6da04e8866d6ee0f15aae2d0428f8805
-
SSDEEP
3072:ZliwDUWyFcB9fu+JMl2uU82Ws7f9sjboPACTQembG4hY/i1vA+wCmG0:ZldD1Yc7GIBgbzjbfLhRW+30
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2036 sgfgrig.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\sgfgrig.exe 2b1aeea167b5a914b2f2168400ad6fd49bbf9111d56cf6a483a4dd58ea6947eb.exe File created C:\PROGRA~3\Mozilla\ogcwmgm.dll sgfgrig.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 968 wrote to memory of 2036 968 taskeng.exe 28 PID 968 wrote to memory of 2036 968 taskeng.exe 28 PID 968 wrote to memory of 2036 968 taskeng.exe 28 PID 968 wrote to memory of 2036 968 taskeng.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b1aeea167b5a914b2f2168400ad6fd49bbf9111d56cf6a483a4dd58ea6947eb.exe"C:\Users\Admin\AppData\Local\Temp\2b1aeea167b5a914b2f2168400ad6fd49bbf9111d56cf6a483a4dd58ea6947eb.exe"1⤵
- Drops file in Program Files directory
PID:1836
-
C:\Windows\system32\taskeng.exetaskeng.exe {641DB269-0BA9-4740-979A-4DDF0B4220C1} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:968 -
C:\PROGRA~3\Mozilla\sgfgrig.exeC:\PROGRA~3\Mozilla\sgfgrig.exe -smuvcxh2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2036
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
170KB
MD5a7b474a0175a9b707cfa9efa3e08c0dd
SHA18aa749583f847cc30ed13a3c7f2b9b5d86ba59fc
SHA25648fae6aac8ea95526543bda24cfc4e4331acb9e336422a27912180350d67f0f9
SHA5124f0f7ab6548f2c38a6340acbae37711be4029257b278751a5b703b241bb09af13221d3ba5ee47d3b713ed00cf5057412e31fb17fbac8e9688a1274e3f7a23263
-
Filesize
170KB
MD5a7b474a0175a9b707cfa9efa3e08c0dd
SHA18aa749583f847cc30ed13a3c7f2b9b5d86ba59fc
SHA25648fae6aac8ea95526543bda24cfc4e4331acb9e336422a27912180350d67f0f9
SHA5124f0f7ab6548f2c38a6340acbae37711be4029257b278751a5b703b241bb09af13221d3ba5ee47d3b713ed00cf5057412e31fb17fbac8e9688a1274e3f7a23263