Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 11:29
Static task
static1
Behavioral task
behavioral1
Sample
9c08cdf9daa8a86033c1d5964a7548d8c3cf0db9c09273571a298e29496db35d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9c08cdf9daa8a86033c1d5964a7548d8c3cf0db9c09273571a298e29496db35d.exe
Resource
win10v2004-20220901-en
General
-
Target
9c08cdf9daa8a86033c1d5964a7548d8c3cf0db9c09273571a298e29496db35d.exe
-
Size
429KB
-
MD5
068e0079e9e30bb0285632fc88d38d50
-
SHA1
b958a663cb9b240a841affe85f0cce5049adde44
-
SHA256
9c08cdf9daa8a86033c1d5964a7548d8c3cf0db9c09273571a298e29496db35d
-
SHA512
108681950b4103d857a77f8be40dc9e1e76cf529a40b27e0778358f15bca3eba26c8d0c135b4a8c1b6dc76cbde914331164d97e5bef5192c7a93f3d6d835ec17
-
SSDEEP
12288:CDJM/bXntAh+nhZoqQEHvVIzJPz//DdvdYkA:Cd6atqLHNk5Tdvo
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 560 jjruejn.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\jjruejn.exe 9c08cdf9daa8a86033c1d5964a7548d8c3cf0db9c09273571a298e29496db35d.exe File created C:\PROGRA~3\Mozilla\segfnra.dll jjruejn.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1276 wrote to memory of 560 1276 taskeng.exe 28 PID 1276 wrote to memory of 560 1276 taskeng.exe 28 PID 1276 wrote to memory of 560 1276 taskeng.exe 28 PID 1276 wrote to memory of 560 1276 taskeng.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c08cdf9daa8a86033c1d5964a7548d8c3cf0db9c09273571a298e29496db35d.exe"C:\Users\Admin\AppData\Local\Temp\9c08cdf9daa8a86033c1d5964a7548d8c3cf0db9c09273571a298e29496db35d.exe"1⤵
- Drops file in Program Files directory
PID:1604
-
C:\Windows\system32\taskeng.exetaskeng.exe {22F76AFA-3E76-4AA0-8486-AFFD666B5C1F} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\PROGRA~3\Mozilla\jjruejn.exeC:\PROGRA~3\Mozilla\jjruejn.exe -npivonl2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:560
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
429KB
MD52d23e956240927b6e5ad472a71bd0783
SHA1d0c560e66557bb46a14f2ee83f143cfc63e97267
SHA2566d63e13fe9594beeb2c3e69cfcbd8295f01cbaf28a33aab331e873620059af9a
SHA51235fafb6b7dc38cbd457ac2d194af4de07580805592c0f71350c424ca543136e2fd57b89cf2b51726c4311ed6bc36b0294821f54d8fde7a6f50367d3fdfc3b725
-
Filesize
429KB
MD52d23e956240927b6e5ad472a71bd0783
SHA1d0c560e66557bb46a14f2ee83f143cfc63e97267
SHA2566d63e13fe9594beeb2c3e69cfcbd8295f01cbaf28a33aab331e873620059af9a
SHA51235fafb6b7dc38cbd457ac2d194af4de07580805592c0f71350c424ca543136e2fd57b89cf2b51726c4311ed6bc36b0294821f54d8fde7a6f50367d3fdfc3b725