Analysis
-
max time kernel
59s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 22:52
Static task
static1
Behavioral task
behavioral1
Sample
330285cda5d7730ef883d7a3b7274c90de71c6be3c86a7a484297587db6e45e8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
330285cda5d7730ef883d7a3b7274c90de71c6be3c86a7a484297587db6e45e8.exe
Resource
win10v2004-20221111-en
General
-
Target
330285cda5d7730ef883d7a3b7274c90de71c6be3c86a7a484297587db6e45e8.exe
-
Size
269KB
-
MD5
4821bb65e5179abd91d1a118315432c0
-
SHA1
1b8dea4709a6d090bb37ca2ca153bd8836f06f68
-
SHA256
330285cda5d7730ef883d7a3b7274c90de71c6be3c86a7a484297587db6e45e8
-
SHA512
d9b37d60f385d7936cea8143639f6f7236c0a8d0aa25baf289224382cf1254f7d8ce0f5edd916458c1cb3e39d84b94f3d5ae0e67fbad25dd6ceb98adf40ff02b
-
SSDEEP
6144:CDJVazMKV31FdaQvXluxqU+A/0y+nt75voqQEnHv0CxN8H9RJPa:CDJM/bXntAh+nhZoqQEHvVIzJPa
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 820 sgfgrig.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\sgfgrig.exe 330285cda5d7730ef883d7a3b7274c90de71c6be3c86a7a484297587db6e45e8.exe File created C:\PROGRA~3\Mozilla\ogcwmgm.dll sgfgrig.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1380 wrote to memory of 820 1380 taskeng.exe 28 PID 1380 wrote to memory of 820 1380 taskeng.exe 28 PID 1380 wrote to memory of 820 1380 taskeng.exe 28 PID 1380 wrote to memory of 820 1380 taskeng.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\330285cda5d7730ef883d7a3b7274c90de71c6be3c86a7a484297587db6e45e8.exe"C:\Users\Admin\AppData\Local\Temp\330285cda5d7730ef883d7a3b7274c90de71c6be3c86a7a484297587db6e45e8.exe"1⤵
- Drops file in Program Files directory
PID:944
-
C:\Windows\system32\taskeng.exetaskeng.exe {A2C24052-5E69-4E1F-A4CE-4A5C4B60A5BC} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\PROGRA~3\Mozilla\sgfgrig.exeC:\PROGRA~3\Mozilla\sgfgrig.exe -smuvcxh2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:820
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
269KB
MD545c45c09daeb45a8a15e11c6ba6eb3fa
SHA1e0f59d7cb0e7d7674f68a9d34f54fc833374dcea
SHA256fdd2d9d20a1f9a1a932efc529b8655ebfa22b803380b74ded60af525725ea584
SHA51263a73f45da08c94823aac745948f5fd1e4a06d7a28ea0be32577bb37665ce9f7e88eb9ec0030c2bd9f4e16cd3457773be6bd090428bdffdb43cac7f4d41310f0
-
Filesize
269KB
MD545c45c09daeb45a8a15e11c6ba6eb3fa
SHA1e0f59d7cb0e7d7674f68a9d34f54fc833374dcea
SHA256fdd2d9d20a1f9a1a932efc529b8655ebfa22b803380b74ded60af525725ea584
SHA51263a73f45da08c94823aac745948f5fd1e4a06d7a28ea0be32577bb37665ce9f7e88eb9ec0030c2bd9f4e16cd3457773be6bd090428bdffdb43cac7f4d41310f0