Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
21/11/2022, 14:51
Static task
static1
Behavioral task
behavioral1
Sample
709d67eb1a7dc6bffa7cd50f978d261f06018af57e47fc4bf45574b1da043964.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
709d67eb1a7dc6bffa7cd50f978d261f06018af57e47fc4bf45574b1da043964.exe
Resource
win10v2004-20220812-en
General
-
Target
709d67eb1a7dc6bffa7cd50f978d261f06018af57e47fc4bf45574b1da043964.exe
-
Size
223KB
-
MD5
3093e6b47aaacbe13aa8b54f0bb55110
-
SHA1
5cce706aa4f38ea811b2f34a7f6395332f5ccf69
-
SHA256
709d67eb1a7dc6bffa7cd50f978d261f06018af57e47fc4bf45574b1da043964
-
SHA512
56b02880750a5d5ca4a67b287369b35780fdb772d64e5739bebed5172bdda1a9e7117417e8a85110fcf95e5fde6cee2cef88c804d7ab8b3c2064ef983fb7675b
-
SSDEEP
3072:d5+iiVM2EB1GG/66WXrAdyUFVdhxDdiht1wNyY9y74W:3FiVdI3S6EabFbiD11R0W
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 584 vjvysqf.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\dgkpgra.dll vjvysqf.exe File created C:\PROGRA~3\Mozilla\vjvysqf.exe 709d67eb1a7dc6bffa7cd50f978d261f06018af57e47fc4bf45574b1da043964.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1764 709d67eb1a7dc6bffa7cd50f978d261f06018af57e47fc4bf45574b1da043964.exe 584 vjvysqf.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1248 wrote to memory of 584 1248 taskeng.exe 29 PID 1248 wrote to memory of 584 1248 taskeng.exe 29 PID 1248 wrote to memory of 584 1248 taskeng.exe 29 PID 1248 wrote to memory of 584 1248 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\709d67eb1a7dc6bffa7cd50f978d261f06018af57e47fc4bf45574b1da043964.exe"C:\Users\Admin\AppData\Local\Temp\709d67eb1a7dc6bffa7cd50f978d261f06018af57e47fc4bf45574b1da043964.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1764
-
C:\Windows\system32\taskeng.exetaskeng.exe {8E5672F4-4AF4-45A4-AAAD-9B911A4F460D} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\PROGRA~3\Mozilla\vjvysqf.exeC:\PROGRA~3\Mozilla\vjvysqf.exe -swhqdtn2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:584
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
223KB
MD576fc737ebee6009241d1bd37fd8d8568
SHA1d4afd416f91e147d7eb3a5350d0e992a875ab38f
SHA256c6f4f233f996a70ea7a6b5abbbd2c45f8217180cc689a067ab48f6408d479c4e
SHA5123703f2227c1907f5a9fb697a2788ed9f049ffa038ac1d98641990cf60e0ed65fd3f3307575570351f9b5733454294955bef07405a42762eecaed0922f0502df0
-
Filesize
223KB
MD576fc737ebee6009241d1bd37fd8d8568
SHA1d4afd416f91e147d7eb3a5350d0e992a875ab38f
SHA256c6f4f233f996a70ea7a6b5abbbd2c45f8217180cc689a067ab48f6408d479c4e
SHA5123703f2227c1907f5a9fb697a2788ed9f049ffa038ac1d98641990cf60e0ed65fd3f3307575570351f9b5733454294955bef07405a42762eecaed0922f0502df0