Analysis
-
max time kernel
43s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06-11-2022 06:48
Static task
static1
Behavioral task
behavioral1
Sample
fa6e20dd860443b2384243a82cd1414bfcdaf0f944cf17c9e228880c31877485.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fa6e20dd860443b2384243a82cd1414bfcdaf0f944cf17c9e228880c31877485.exe
Resource
win10v2004-20220812-en
General
-
Target
fa6e20dd860443b2384243a82cd1414bfcdaf0f944cf17c9e228880c31877485.exe
-
Size
695KB
-
MD5
10452573b666825c8d94053c58fa0630
-
SHA1
21cde5779fa884171d65ad3c2c9df31d8bda9f59
-
SHA256
fa6e20dd860443b2384243a82cd1414bfcdaf0f944cf17c9e228880c31877485
-
SHA512
73392df60bef168a948850154d3b0cb638992d0ec6f6d259275eaf77eb4065d951e91ace29e2317c34324d3b7c28cb94e1e5018b958c3cdaa0e4755892735226
-
SSDEEP
12288:51i/ljo6d94Z2NC+H07HQP4pgIHy0/GqBcL4DGsxv3FAG06CaN57JoMbXf+5AYIR:51i9Igs57HQPzIXGqy0K2t5CaV5bXWaR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1168 jjruejn.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\jjruejn.exe fa6e20dd860443b2384243a82cd1414bfcdaf0f944cf17c9e228880c31877485.exe File created C:\PROGRA~3\Mozilla\segfnra.dll jjruejn.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 948 wrote to memory of 1168 948 taskeng.exe 28 PID 948 wrote to memory of 1168 948 taskeng.exe 28 PID 948 wrote to memory of 1168 948 taskeng.exe 28 PID 948 wrote to memory of 1168 948 taskeng.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa6e20dd860443b2384243a82cd1414bfcdaf0f944cf17c9e228880c31877485.exe"C:\Users\Admin\AppData\Local\Temp\fa6e20dd860443b2384243a82cd1414bfcdaf0f944cf17c9e228880c31877485.exe"1⤵
- Drops file in Program Files directory
PID:1228
-
C:\Windows\system32\taskeng.exetaskeng.exe {F3F73823-D8A6-4239-B7D7-78C7A9CC7FC5} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:948 -
C:\PROGRA~3\Mozilla\jjruejn.exeC:\PROGRA~3\Mozilla\jjruejn.exe -npivonl2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1168
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
695KB
MD5e1c20dc6a2a8bdf4bb80fa3e0b9aaa3e
SHA15f5f6e618a7d6f5c88f1eb2d11cd0a88856a5dcb
SHA2569a5b1fa92d94883ef0a5651722b2cd5d0a7c409c95da1d802bf7ba9862ae35fe
SHA512057b6f5c5facecee308e76460732c979d0677c10083f2597573d654dcb51e2126bd9c3c557b272c37c5fa159567a9ea1956f187e9309eadd0af3ae568467dc5f
-
Filesize
695KB
MD5e1c20dc6a2a8bdf4bb80fa3e0b9aaa3e
SHA15f5f6e618a7d6f5c88f1eb2d11cd0a88856a5dcb
SHA2569a5b1fa92d94883ef0a5651722b2cd5d0a7c409c95da1d802bf7ba9862ae35fe
SHA512057b6f5c5facecee308e76460732c979d0677c10083f2597573d654dcb51e2126bd9c3c557b272c37c5fa159567a9ea1956f187e9309eadd0af3ae568467dc5f