Analysis
-
max time kernel
56s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-11-2022 07:50
Static task
static1
Behavioral task
behavioral1
Sample
a980fe4c2d9c05192b71fe29aee1d6421243a3c48105628f1d37611668a5c930.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a980fe4c2d9c05192b71fe29aee1d6421243a3c48105628f1d37611668a5c930.exe
Resource
win10v2004-20220812-en
General
-
Target
a980fe4c2d9c05192b71fe29aee1d6421243a3c48105628f1d37611668a5c930.exe
-
Size
329KB
-
MD5
574f831525cc7a5d42ee8d9311563880
-
SHA1
8dc051655edb4424f57602864ba7cf0ec77f735d
-
SHA256
a980fe4c2d9c05192b71fe29aee1d6421243a3c48105628f1d37611668a5c930
-
SHA512
3d91ed376d34da7e4109e1700ca4d46fc522cb4471e596073af9d5aecfd0803fa042fb321ac42c4e99b1f5b8f4ee928dd3caf24661a74ff6250dc1b4927740ab
-
SSDEEP
6144:siMF/X479SEAanPSIv0FB5iSbGqJQjdSHN:sI79SE1lMFmS+dYN
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1184 sgfgrig.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\sgfgrig.exe a980fe4c2d9c05192b71fe29aee1d6421243a3c48105628f1d37611668a5c930.exe File created C:\PROGRA~3\Mozilla\ogcwmgm.dll sgfgrig.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 748 a980fe4c2d9c05192b71fe29aee1d6421243a3c48105628f1d37611668a5c930.exe 1184 sgfgrig.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1736 wrote to memory of 1184 1736 taskeng.exe 29 PID 1736 wrote to memory of 1184 1736 taskeng.exe 29 PID 1736 wrote to memory of 1184 1736 taskeng.exe 29 PID 1736 wrote to memory of 1184 1736 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\a980fe4c2d9c05192b71fe29aee1d6421243a3c48105628f1d37611668a5c930.exe"C:\Users\Admin\AppData\Local\Temp\a980fe4c2d9c05192b71fe29aee1d6421243a3c48105628f1d37611668a5c930.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:748
-
C:\Windows\system32\taskeng.exetaskeng.exe {5D256F6E-C851-4493-AC96-B0387CD5D63E} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\PROGRA~3\Mozilla\sgfgrig.exeC:\PROGRA~3\Mozilla\sgfgrig.exe -smuvcxh2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1184
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
329KB
MD5002f6892770e9332a32558acf8b5023f
SHA1636c48c3acac34b3100cc73dd695417c72a26cec
SHA2564077ec038957eb4f91dbe99e77633039c346bf83e777c93c64528f698abba466
SHA512449ef4bd8983d404b6d7fe374ba394741c38c95ff7935169aa137c81d8d05965c1a3ef188548ad40d4ed20e76f3fccc26b0191714074a8a03fe6b255f06fe8a1
-
Filesize
329KB
MD5002f6892770e9332a32558acf8b5023f
SHA1636c48c3acac34b3100cc73dd695417c72a26cec
SHA2564077ec038957eb4f91dbe99e77633039c346bf83e777c93c64528f698abba466
SHA512449ef4bd8983d404b6d7fe374ba394741c38c95ff7935169aa137c81d8d05965c1a3ef188548ad40d4ed20e76f3fccc26b0191714074a8a03fe6b255f06fe8a1