Analysis
-
max time kernel
41s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 14:28
Static task
static1
Behavioral task
behavioral1
Sample
04479ab4040221b5d16a3dbc8b3529c2b3cbb3a956205e44c7eaba9933ee9cca.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
04479ab4040221b5d16a3dbc8b3529c2b3cbb3a956205e44c7eaba9933ee9cca.exe
Resource
win10v2004-20220812-en
General
-
Target
04479ab4040221b5d16a3dbc8b3529c2b3cbb3a956205e44c7eaba9933ee9cca.exe
-
Size
266KB
-
MD5
2007ee8e85f49b74dddf12dfa7a2c510
-
SHA1
b0cf4bfa76a5044f5369a17b0b9356ec5d00f9d0
-
SHA256
04479ab4040221b5d16a3dbc8b3529c2b3cbb3a956205e44c7eaba9933ee9cca
-
SHA512
b2809ecba9631d803a109bf4a2d40055eadb3766465c5ae668fc07faa0ea04fc7ea958275fcc28112c49a8fcdb992030a1f1ae73b7af3c836406314101b3676d
-
SSDEEP
6144:4wnqO4OgaqP/MlH3aN5eDds5A/D8XG2MBuW4a/ViE2lPnT5sc7uVzmCoZbnQ:Dq7dnGqNSR/ygus/gNT6cqhebQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1596 jwufxge.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\jwufxge.exe 04479ab4040221b5d16a3dbc8b3529c2b3cbb3a956205e44c7eaba9933ee9cca.exe File created C:\PROGRA~3\Mozilla\hvkykah.dll jwufxge.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 112 wrote to memory of 1596 112 taskeng.exe 27 PID 112 wrote to memory of 1596 112 taskeng.exe 27 PID 112 wrote to memory of 1596 112 taskeng.exe 27 PID 112 wrote to memory of 1596 112 taskeng.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\04479ab4040221b5d16a3dbc8b3529c2b3cbb3a956205e44c7eaba9933ee9cca.exe"C:\Users\Admin\AppData\Local\Temp\04479ab4040221b5d16a3dbc8b3529c2b3cbb3a956205e44c7eaba9933ee9cca.exe"1⤵
- Drops file in Program Files directory
PID:2044
-
C:\Windows\system32\taskeng.exetaskeng.exe {FCD45B74-650C-409F-8341-6AF0268EB0A2} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:112 -
C:\PROGRA~3\Mozilla\jwufxge.exeC:\PROGRA~3\Mozilla\jwufxge.exe -kqepohf2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1596
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266KB
MD52588d7477b5074bf608fd0575c7b268f
SHA1bb4dfa66847e1f72bb3ec404ff0e8617891fb163
SHA2564ab556fdffb32b86669dc56b55ac5bf59f00ec15b54f5e4b7e599f4d0c8f86dc
SHA5120a568adc1ad69eaf2ce360c2f50f4229b64ae90635b95f580899e099bb6ce1f171da077146ac4e75573954147d8e1b1fad56623f55fbc1ffd8443be278aa668d
-
Filesize
266KB
MD52588d7477b5074bf608fd0575c7b268f
SHA1bb4dfa66847e1f72bb3ec404ff0e8617891fb163
SHA2564ab556fdffb32b86669dc56b55ac5bf59f00ec15b54f5e4b7e599f4d0c8f86dc
SHA5120a568adc1ad69eaf2ce360c2f50f4229b64ae90635b95f580899e099bb6ce1f171da077146ac4e75573954147d8e1b1fad56623f55fbc1ffd8443be278aa668d