Analysis
-
max time kernel
79s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 09:35
Static task
static1
Behavioral task
behavioral1
Sample
1b346fba849f3ded2c1a7ad5003586abc6ddc49cc312ff60d865864d698ac643.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1b346fba849f3ded2c1a7ad5003586abc6ddc49cc312ff60d865864d698ac643.exe
Resource
win10v2004-20220812-en
General
-
Target
1b346fba849f3ded2c1a7ad5003586abc6ddc49cc312ff60d865864d698ac643.exe
-
Size
150KB
-
MD5
3ad74d2fe365b567c989800fa4e4c7e0
-
SHA1
f3468419a95238e9d9880274fbb548faeb100045
-
SHA256
1b346fba849f3ded2c1a7ad5003586abc6ddc49cc312ff60d865864d698ac643
-
SHA512
872bb4e2491183bbe776ba4372edc6c99bf7c7ff7ca5ae387c42f4e077fc1adcbb186d6652a49c30061f74a7a5aeac7a3e2e23be04a726890d645f50ba1bcfcf
-
SSDEEP
3072:mc9XTpcvocFIALdm3vL5wI1G6OoBQXTmy5xEKJ9W8NR1vmwXf:F9X1qoEd2v9wI1XOoTDHER1R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 988 nswitkh.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\nswitkh.exe 1b346fba849f3ded2c1a7ad5003586abc6ddc49cc312ff60d865864d698ac643.exe File created C:\PROGRA~3\Mozilla\zgooxfa.dll nswitkh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 988 1732 taskeng.exe 28 PID 1732 wrote to memory of 988 1732 taskeng.exe 28 PID 1732 wrote to memory of 988 1732 taskeng.exe 28 PID 1732 wrote to memory of 988 1732 taskeng.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b346fba849f3ded2c1a7ad5003586abc6ddc49cc312ff60d865864d698ac643.exe"C:\Users\Admin\AppData\Local\Temp\1b346fba849f3ded2c1a7ad5003586abc6ddc49cc312ff60d865864d698ac643.exe"1⤵
- Drops file in Program Files directory
PID:1756
-
C:\Windows\system32\taskeng.exetaskeng.exe {BC5001AD-0C6E-4FD3-A032-91A890EAFC5E} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\PROGRA~3\Mozilla\nswitkh.exeC:\PROGRA~3\Mozilla\nswitkh.exe -vhgoixm2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:988
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150KB
MD5ccb6eb51a181da836c4fd5a0f9d97965
SHA12e25b6f816e16d38d5e77f94da7c4013b1ed1fc2
SHA25603f6137c5646d431f0d5f7710fc32321731c8872e2a395551cd5e1398b04b9e2
SHA512e0ff15461043b7d9237e6f9ac638d37a079ba1defc0570665a11c154c76d38c24c3e0608c1adb4701bdfe5ca01e293230b35527da806c5665660f6a19c45fba7
-
Filesize
150KB
MD5ccb6eb51a181da836c4fd5a0f9d97965
SHA12e25b6f816e16d38d5e77f94da7c4013b1ed1fc2
SHA25603f6137c5646d431f0d5f7710fc32321731c8872e2a395551cd5e1398b04b9e2
SHA512e0ff15461043b7d9237e6f9ac638d37a079ba1defc0570665a11c154c76d38c24c3e0608c1adb4701bdfe5ca01e293230b35527da806c5665660f6a19c45fba7