Analysis
-
max time kernel
54s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-11-2022 09:53
Static task
static1
Behavioral task
behavioral1
Sample
004fd7fcbc35ba4e1cc9a3c16fe7c38813d757448ead97562866aeb03a968561.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
004fd7fcbc35ba4e1cc9a3c16fe7c38813d757448ead97562866aeb03a968561.exe
Resource
win10v2004-20220812-en
General
-
Target
004fd7fcbc35ba4e1cc9a3c16fe7c38813d757448ead97562866aeb03a968561.exe
-
Size
249KB
-
MD5
124d60218c293cee96474ebdeaf3b25f
-
SHA1
fb8923ab42686c1746de00ac597f2ead296a5f65
-
SHA256
004fd7fcbc35ba4e1cc9a3c16fe7c38813d757448ead97562866aeb03a968561
-
SHA512
ab3f0222ff894d57a5597333e866e9d0f15dbdc54bfa04fb1cb32a0d274d40f80dab18f4e69556bbe894ff2c992bf93caacd2b6d9ffedd5aac364bfcb4d5a061
-
SSDEEP
6144:IiV3M7tydyE7ztsY4yTr8bjeJwj2EItHp4Pl6yzm:Iu3URWtsYf8PemjE8m
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1528 nswitkh.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\nswitkh.exe 004fd7fcbc35ba4e1cc9a3c16fe7c38813d757448ead97562866aeb03a968561.exe File created C:\PROGRA~3\Mozilla\zgooxfa.dll nswitkh.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2016 004fd7fcbc35ba4e1cc9a3c16fe7c38813d757448ead97562866aeb03a968561.exe 1528 nswitkh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1376 wrote to memory of 1528 1376 taskeng.exe 28 PID 1376 wrote to memory of 1528 1376 taskeng.exe 28 PID 1376 wrote to memory of 1528 1376 taskeng.exe 28 PID 1376 wrote to memory of 1528 1376 taskeng.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\004fd7fcbc35ba4e1cc9a3c16fe7c38813d757448ead97562866aeb03a968561.exe"C:\Users\Admin\AppData\Local\Temp\004fd7fcbc35ba4e1cc9a3c16fe7c38813d757448ead97562866aeb03a968561.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2016
-
C:\Windows\system32\taskeng.exetaskeng.exe {E8514208-E8DE-4A86-86A3-94A7A84EF02B} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\PROGRA~3\Mozilla\nswitkh.exeC:\PROGRA~3\Mozilla\nswitkh.exe -vhgoixm2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1528
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
249KB
MD5b9f4f5d6ffe2483217789eddaa855685
SHA1ef3077ab7250f923c5e6ad7d05a3a6c0f7fb7d1d
SHA256c5be125947a0430ec66f66569425237b07211f9f916e8cef4f1b76488779ca8a
SHA5122f4e55d5c92237b2ee1e8fcd0daf5c76bddf023effbea76fbeb664ba353c2ce2ac63eceafec5bc0690bd1ce00e3f6c6b5f5b32fafca00f1ef7b125b66c1ee507
-
Filesize
249KB
MD5b9f4f5d6ffe2483217789eddaa855685
SHA1ef3077ab7250f923c5e6ad7d05a3a6c0f7fb7d1d
SHA256c5be125947a0430ec66f66569425237b07211f9f916e8cef4f1b76488779ca8a
SHA5122f4e55d5c92237b2ee1e8fcd0daf5c76bddf023effbea76fbeb664ba353c2ce2ac63eceafec5bc0690bd1ce00e3f6c6b5f5b32fafca00f1ef7b125b66c1ee507