Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23/11/2022, 22:12
Static task
static1
Behavioral task
behavioral1
Sample
b04d54b4e8bc572940fa638e699dfafa8b7efd59aefa06e24f9103aced37291b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b04d54b4e8bc572940fa638e699dfafa8b7efd59aefa06e24f9103aced37291b.exe
Resource
win10v2004-20220812-en
General
-
Target
b04d54b4e8bc572940fa638e699dfafa8b7efd59aefa06e24f9103aced37291b.exe
-
Size
274KB
-
MD5
53b74d5697a8fb550f729e5f96f0cae0
-
SHA1
85f8e85b6e801f75ce212a17872b4dceee9fd5d4
-
SHA256
b04d54b4e8bc572940fa638e699dfafa8b7efd59aefa06e24f9103aced37291b
-
SHA512
421fb2616fac749a10aa069d6779d3f723fcbfbce49c47efc6c990cf6006917178536f994c01e21b66ec5c842d4b11de4bc9889cab11e40280425c345a38d991
-
SSDEEP
6144:y0bR1+5kWFQBYAcJDpo6FPPt6g2BZ2B+Ylo63ZlDI7kcQPO:51i/ljo6d94Z2NC+H07HQPO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1300 jjruejn.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\segfnra.dll jjruejn.exe File created C:\PROGRA~3\Mozilla\jjruejn.exe b04d54b4e8bc572940fa638e699dfafa8b7efd59aefa06e24f9103aced37291b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1300 2036 taskeng.exe 28 PID 2036 wrote to memory of 1300 2036 taskeng.exe 28 PID 2036 wrote to memory of 1300 2036 taskeng.exe 28 PID 2036 wrote to memory of 1300 2036 taskeng.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b04d54b4e8bc572940fa638e699dfafa8b7efd59aefa06e24f9103aced37291b.exe"C:\Users\Admin\AppData\Local\Temp\b04d54b4e8bc572940fa638e699dfafa8b7efd59aefa06e24f9103aced37291b.exe"1⤵
- Drops file in Program Files directory
PID:1304
-
C:\Windows\system32\taskeng.exetaskeng.exe {BFC5BC3E-20D2-4101-A07E-520C2BDDAFFC} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\PROGRA~3\Mozilla\jjruejn.exeC:\PROGRA~3\Mozilla\jjruejn.exe -npivonl2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1300
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274KB
MD5bdc9e3ee7cf2ee5cc911b59b9e45c57e
SHA1e82d4337b935e339875995c197f7446ad128b143
SHA256c7e22f38c7929980aadae4988c14298cda0751f7692cc4de9bc67a3c0c76d760
SHA512b383fd5ffcad55c0f51184ddbe544b7eb20026f515e338b673609dc64a8a94a1f710fdbb6161e51466f941a95b020fcbf998bcd322a9d0ceb92a612680302a2a
-
Filesize
274KB
MD5bdc9e3ee7cf2ee5cc911b59b9e45c57e
SHA1e82d4337b935e339875995c197f7446ad128b143
SHA256c7e22f38c7929980aadae4988c14298cda0751f7692cc4de9bc67a3c0c76d760
SHA512b383fd5ffcad55c0f51184ddbe544b7eb20026f515e338b673609dc64a8a94a1f710fdbb6161e51466f941a95b020fcbf998bcd322a9d0ceb92a612680302a2a