Analysis
-
max time kernel
56s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 08:22
Static task
static1
Behavioral task
behavioral1
Sample
66f3af32b02e561761cb2610a40e819d8662f294c71e6e6f3f4e3ff333f9ed17.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
66f3af32b02e561761cb2610a40e819d8662f294c71e6e6f3f4e3ff333f9ed17.exe
Resource
win10v2004-20220812-en
General
-
Target
66f3af32b02e561761cb2610a40e819d8662f294c71e6e6f3f4e3ff333f9ed17.exe
-
Size
469KB
-
MD5
1cda9c98d834cca721567b6f27a30650
-
SHA1
ec89438da6450a6bd35b58221eb3b408ae9a4763
-
SHA256
66f3af32b02e561761cb2610a40e819d8662f294c71e6e6f3f4e3ff333f9ed17
-
SHA512
157f4a30cc96692acb9e2686f42e4cf353ff99b6478cc20e802f34a8ab9751626a6fb94a1aa9b0ccba686d2de455ddd8fafa215a9888d45d0e4107667bb8a904
-
SSDEEP
12288:CyhwfA1dYAMbtrvRqNVAUDY5JQsKmD0qIZSqLOQHve:C25a552VAUDaaKAOq6QHve
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1760 nswitkh.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\zgooxfa.dll nswitkh.exe File created C:\PROGRA~3\Mozilla\nswitkh.exe 66f3af32b02e561761cb2610a40e819d8662f294c71e6e6f3f4e3ff333f9ed17.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1124 wrote to memory of 1760 1124 taskeng.exe 29 PID 1124 wrote to memory of 1760 1124 taskeng.exe 29 PID 1124 wrote to memory of 1760 1124 taskeng.exe 29 PID 1124 wrote to memory of 1760 1124 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\66f3af32b02e561761cb2610a40e819d8662f294c71e6e6f3f4e3ff333f9ed17.exe"C:\Users\Admin\AppData\Local\Temp\66f3af32b02e561761cb2610a40e819d8662f294c71e6e6f3f4e3ff333f9ed17.exe"1⤵
- Drops file in Program Files directory
PID:1280
-
C:\Windows\system32\taskeng.exetaskeng.exe {15CD5328-37FC-4AD2-9F4A-B007E8C8A588} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\PROGRA~3\Mozilla\nswitkh.exeC:\PROGRA~3\Mozilla\nswitkh.exe -vhgoixm2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1760
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
469KB
MD584e729391efa267a068089948327e959
SHA1a60bcfe3d9ca8a66ed475f79cabdabc66817e131
SHA2563f10b69be26029e97a1822edb0093f58b0f25899ac05deeac4aace56e33884d5
SHA51226c7337debee9ba40092a3821d05ea4aee92b49f60874d57a7e12c27bdb3eeb0c863aa6853fca32527de58835d518cdbe539a7763fa2940f38f8b8cda15be33f
-
Filesize
469KB
MD584e729391efa267a068089948327e959
SHA1a60bcfe3d9ca8a66ed475f79cabdabc66817e131
SHA2563f10b69be26029e97a1822edb0093f58b0f25899ac05deeac4aace56e33884d5
SHA51226c7337debee9ba40092a3821d05ea4aee92b49f60874d57a7e12c27bdb3eeb0c863aa6853fca32527de58835d518cdbe539a7763fa2940f38f8b8cda15be33f