Analysis
-
max time kernel
34s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-11-2022 09:53
Static task
static1
Behavioral task
behavioral1
Sample
00266e6eae5db134015ea760ac87157e7d84557ce7658c3bbd679c8bf26a778f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
00266e6eae5db134015ea760ac87157e7d84557ce7658c3bbd679c8bf26a778f.exe
Resource
win10v2004-20220901-en
General
-
Target
00266e6eae5db134015ea760ac87157e7d84557ce7658c3bbd679c8bf26a778f.exe
-
Size
164KB
-
MD5
311eed17c8dd7d65e7ec27b17b30bfd0
-
SHA1
a4f2fa2afb0f943cdb9e222e287991137503263b
-
SHA256
00266e6eae5db134015ea760ac87157e7d84557ce7658c3bbd679c8bf26a778f
-
SHA512
7ae269d8b6e45a615f785d563333f81185ae8b745ef4909463ba7726320267851ea2de7830c12d772ae5719d726f0143cb2a6a1e1d61f333bc0d4e6486b4459a
-
SSDEEP
3072:ZliwDUWyFcB9fu+JMl2uU82Ws7f9sjboPACTQembG4hY/i1vAK:ZldD1Yc7GIBgbzjbfLhRWK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 324 jwufxge.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\jwufxge.exe 00266e6eae5db134015ea760ac87157e7d84557ce7658c3bbd679c8bf26a778f.exe File created C:\PROGRA~3\Mozilla\hvkykah.dll jwufxge.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 936 wrote to memory of 324 936 taskeng.exe 28 PID 936 wrote to memory of 324 936 taskeng.exe 28 PID 936 wrote to memory of 324 936 taskeng.exe 28 PID 936 wrote to memory of 324 936 taskeng.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\00266e6eae5db134015ea760ac87157e7d84557ce7658c3bbd679c8bf26a778f.exe"C:\Users\Admin\AppData\Local\Temp\00266e6eae5db134015ea760ac87157e7d84557ce7658c3bbd679c8bf26a778f.exe"1⤵
- Drops file in Program Files directory
PID:748
-
C:\Windows\system32\taskeng.exetaskeng.exe {32C3DEE6-6C21-4004-A251-A3771F5582B9} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:936 -
C:\PROGRA~3\Mozilla\jwufxge.exeC:\PROGRA~3\Mozilla\jwufxge.exe -kqepohf2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:324
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164KB
MD50b025ab2e58eb5a53d519d40c4a16eeb
SHA1b0be07e381eeb8780cf072dc8dc3132031e3c1de
SHA25606a7d8191f979f20a08cb474f6da35990017b36d8755c02e52c111f189acef52
SHA512422a92f14982cda4d8a43b4f5ceca0d4944d4b9f5dee5dc767c68a61b5eef83dcbd7a6cda67e076940575b2d69db459d6952ba488f4e8e63755c15f1fb152ff1
-
Filesize
164KB
MD50b025ab2e58eb5a53d519d40c4a16eeb
SHA1b0be07e381eeb8780cf072dc8dc3132031e3c1de
SHA25606a7d8191f979f20a08cb474f6da35990017b36d8755c02e52c111f189acef52
SHA512422a92f14982cda4d8a43b4f5ceca0d4944d4b9f5dee5dc767c68a61b5eef83dcbd7a6cda67e076940575b2d69db459d6952ba488f4e8e63755c15f1fb152ff1