Analysis
-
max time kernel
37s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-11-2022 13:39
Static task
static1
Behavioral task
behavioral1
Sample
395f95494512a488d5e8ecaf289969e3b362a1718ed0cebf47d770053b77c733.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
395f95494512a488d5e8ecaf289969e3b362a1718ed0cebf47d770053b77c733.exe
Resource
win10v2004-20220901-en
General
-
Target
395f95494512a488d5e8ecaf289969e3b362a1718ed0cebf47d770053b77c733.exe
-
Size
137KB
-
MD5
0dcdf3a89547e850a97aee99bded9be0
-
SHA1
81b181f33d24a49ac3c33e7b5d8a914c6dc37a6f
-
SHA256
395f95494512a488d5e8ecaf289969e3b362a1718ed0cebf47d770053b77c733
-
SHA512
1b6dcfe8ba587bdc576f48d719e3024acf91b61ab35d5f89ade8e2f8f367cc78d22203fc1226f906ae40c7ef733150047623d98edb662a51f5cedcc56606d485
-
SSDEEP
3072:mcLXTpcvocFIALdm3vL52HBnXTmy5xEKJ9W8NRSZt:FLX1qoEd2v928DHERSZt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 240 jwufxge.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\jwufxge.exe 395f95494512a488d5e8ecaf289969e3b362a1718ed0cebf47d770053b77c733.exe File created C:\PROGRA~3\Mozilla\hvkykah.dll jwufxge.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1852 wrote to memory of 240 1852 taskeng.exe 28 PID 1852 wrote to memory of 240 1852 taskeng.exe 28 PID 1852 wrote to memory of 240 1852 taskeng.exe 28 PID 1852 wrote to memory of 240 1852 taskeng.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\395f95494512a488d5e8ecaf289969e3b362a1718ed0cebf47d770053b77c733.exe"C:\Users\Admin\AppData\Local\Temp\395f95494512a488d5e8ecaf289969e3b362a1718ed0cebf47d770053b77c733.exe"1⤵
- Drops file in Program Files directory
PID:900
-
C:\Windows\system32\taskeng.exetaskeng.exe {24553973-1762-4224-A222-4F7116E7B248} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\PROGRA~3\Mozilla\jwufxge.exeC:\PROGRA~3\Mozilla\jwufxge.exe -kqepohf2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:240
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
137KB
MD5d7ef3a0239ebe0748ca077f73b949fe0
SHA189d83b3d2a98d76f668849fe7fa9848d0a9e03bc
SHA2562d458ca276402525f4a34b7de534ad3cdcc5ff534504c80050fd693ef2f8e3fa
SHA512b5047b7856744a8de3e2ffdf82cf6143ca2da4290da1d2a4ac68e749edeaf17921ec1b05557cb7aa19df1d16bb6c66d7585794fc5e0d8c7f5b8ecedf2572abd2
-
Filesize
137KB
MD5d7ef3a0239ebe0748ca077f73b949fe0
SHA189d83b3d2a98d76f668849fe7fa9848d0a9e03bc
SHA2562d458ca276402525f4a34b7de534ad3cdcc5ff534504c80050fd693ef2f8e3fa
SHA512b5047b7856744a8de3e2ffdf82cf6143ca2da4290da1d2a4ac68e749edeaf17921ec1b05557cb7aa19df1d16bb6c66d7585794fc5e0d8c7f5b8ecedf2572abd2