Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30-10-2022 18:26
Static task
static1
Behavioral task
behavioral1
Sample
2194bf04af067b53fe692a273373505864826f02f863b1a7114a98cbab9f67a4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2194bf04af067b53fe692a273373505864826f02f863b1a7114a98cbab9f67a4.exe
Resource
win10v2004-20220812-en
General
-
Target
2194bf04af067b53fe692a273373505864826f02f863b1a7114a98cbab9f67a4.exe
-
Size
219KB
-
MD5
829929444139182ca80f6d42b7e67470
-
SHA1
f29324561e996f76b0af50997af41b056b0fa26b
-
SHA256
2194bf04af067b53fe692a273373505864826f02f863b1a7114a98cbab9f67a4
-
SHA512
9d925ad37ce6bcfa8371f09fbdffb4d6dbd212b1ac27149bc7268b927e483493d0468863207d4b560b75cce1dddf8274c4ccf049c4add370d219cb8b2597fcb0
-
SSDEEP
3072:zu65oMNF6eyu2dlCi520wzhpkX96cYEVuGAboR:zu6yMv6eyuKUiVt6mOboR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1124 jjruejn.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\jjruejn.exe 2194bf04af067b53fe692a273373505864826f02f863b1a7114a98cbab9f67a4.exe File created C:\PROGRA~3\Mozilla\segfnra.dll jjruejn.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2032 2194bf04af067b53fe692a273373505864826f02f863b1a7114a98cbab9f67a4.exe 1124 jjruejn.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 1124 1688 taskeng.exe 28 PID 1688 wrote to memory of 1124 1688 taskeng.exe 28 PID 1688 wrote to memory of 1124 1688 taskeng.exe 28 PID 1688 wrote to memory of 1124 1688 taskeng.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2194bf04af067b53fe692a273373505864826f02f863b1a7114a98cbab9f67a4.exe"C:\Users\Admin\AppData\Local\Temp\2194bf04af067b53fe692a273373505864826f02f863b1a7114a98cbab9f67a4.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2032
-
C:\Windows\system32\taskeng.exetaskeng.exe {8141CB5E-4609-4A22-B5BC-3651B3C4EFD9} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\PROGRA~3\Mozilla\jjruejn.exeC:\PROGRA~3\Mozilla\jjruejn.exe -npivonl2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1124
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
219KB
MD539b8eb9013dcc604e58df19e09d6a3d7
SHA147e2fbf0719f07c89251fc2d18054e66b4d6221d
SHA2566cf4cf97b8d96ee4018d7437a330e98a44ca2d6dfc91fb56894dcbca35915e92
SHA51266e9ab8ff0b8dbb1a8da1bd6f962a6f75675e4423e9ce75a9d20c5905e3edbd527c4356180990be63348321b7878ce58138b9c611a5cc76d57c5d085b6b5c5e9
-
Filesize
219KB
MD539b8eb9013dcc604e58df19e09d6a3d7
SHA147e2fbf0719f07c89251fc2d18054e66b4d6221d
SHA2566cf4cf97b8d96ee4018d7437a330e98a44ca2d6dfc91fb56894dcbca35915e92
SHA51266e9ab8ff0b8dbb1a8da1bd6f962a6f75675e4423e9ce75a9d20c5905e3edbd527c4356180990be63348321b7878ce58138b9c611a5cc76d57c5d085b6b5c5e9