Analysis
-
max time kernel
47s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30-10-2022 16:20
Static task
static1
Behavioral task
behavioral1
Sample
54a965b031265e591db5ca4e9f3e2774bd1dbf7e25b994661834a49833c5ef4f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
54a965b031265e591db5ca4e9f3e2774bd1dbf7e25b994661834a49833c5ef4f.exe
Resource
win10v2004-20220812-en
General
-
Target
54a965b031265e591db5ca4e9f3e2774bd1dbf7e25b994661834a49833c5ef4f.exe
-
Size
270KB
-
MD5
823ec4c199e02e6cccc89cf6e92d9250
-
SHA1
e1321b3d0e2dfc99bfd7dbe1e31df30e6605c244
-
SHA256
54a965b031265e591db5ca4e9f3e2774bd1dbf7e25b994661834a49833c5ef4f
-
SHA512
ec1aee7e6ed53d11226d7a24e01084a2b87b71f0b4c0bf2f62ffc50fe0b74a9c4147c2a9f208982b78fa4e855c79feb156b8f7d208595cbade9d684d11ed3123
-
SSDEEP
6144:CDJVazMKV31FdaQvXluxqU+A/0y+nt75voqQEnHv0CxN8H9RJPD:CDJM/bXntAh+nhZoqQEHvVIzJPD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1228 jjruejn.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\jjruejn.exe 54a965b031265e591db5ca4e9f3e2774bd1dbf7e25b994661834a49833c5ef4f.exe File created C:\PROGRA~3\Mozilla\segfnra.dll jjruejn.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2028 wrote to memory of 1228 2028 taskeng.exe 28 PID 2028 wrote to memory of 1228 2028 taskeng.exe 28 PID 2028 wrote to memory of 1228 2028 taskeng.exe 28 PID 2028 wrote to memory of 1228 2028 taskeng.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\54a965b031265e591db5ca4e9f3e2774bd1dbf7e25b994661834a49833c5ef4f.exe"C:\Users\Admin\AppData\Local\Temp\54a965b031265e591db5ca4e9f3e2774bd1dbf7e25b994661834a49833c5ef4f.exe"1⤵
- Drops file in Program Files directory
PID:1060
-
C:\Windows\system32\taskeng.exetaskeng.exe {062F8956-B5D5-4C4F-81CC-1F23CEB99284} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\PROGRA~3\Mozilla\jjruejn.exeC:\PROGRA~3\Mozilla\jjruejn.exe -npivonl2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1228
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
270KB
MD5d6ab2246da9be85744ff34d1af4203c0
SHA1f7285a53b68cdec56e00eb85d7320352e088eef4
SHA25622ee5682b83e8f5417dc9cd12e3e6f4a46ecaf34c4bb6f7bea71d01a0ca394db
SHA512fc2bd6090925494fea3186a71abe5e1d884e3568db955b47e62cc5c113252cd0e4a559c79582d565fac217f56510b41cae6038018945a84317f262357a6f1ed0
-
Filesize
270KB
MD5d6ab2246da9be85744ff34d1af4203c0
SHA1f7285a53b68cdec56e00eb85d7320352e088eef4
SHA25622ee5682b83e8f5417dc9cd12e3e6f4a46ecaf34c4bb6f7bea71d01a0ca394db
SHA512fc2bd6090925494fea3186a71abe5e1d884e3568db955b47e62cc5c113252cd0e4a559c79582d565fac217f56510b41cae6038018945a84317f262357a6f1ed0