Analysis

  • max time kernel
    115s
  • max time network
    39s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2022 08:49

General

  • Target

    5c45a828f87693b676b48f8f101115213563b50d0955c2771606dbfd22ff7d74.exe

  • Size

    558KB

  • MD5

    3372aa0bd4c0ccd2e7847fc32ef89340

  • SHA1

    bbb61416c46fb035f41a6cd5c42247940c0502f8

  • SHA256

    5c45a828f87693b676b48f8f101115213563b50d0955c2771606dbfd22ff7d74

  • SHA512

    d6c95b353a50d582d6298e8d425b8af9b89a50945a76c9f78900c52cb2408ff1372be4236faf033ab2f88968d83a60eed4bf78fdd7baa5686dac5e8e8a52a073

  • SSDEEP

    12288:Iu3URWtsYf8PemjE8h0UxH9ND6fvhMrf1seW2/ag2n+p:IkQe8PemjTh0Ul/8vh+qUA+p

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies AppInit DLL entries 2 TTPs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c45a828f87693b676b48f8f101115213563b50d0955c2771606dbfd22ff7d74.exe
    "C:\Users\Admin\AppData\Local\Temp\5c45a828f87693b676b48f8f101115213563b50d0955c2771606dbfd22ff7d74.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of UnmapMainImage
    PID:588
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {59AE4BBD-F34A-42F7-BE89-976DAF5CAF41} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1480
    • C:\PROGRA~3\Mozilla\jydekdj.exe
      C:\PROGRA~3\Mozilla\jydekdj.exe -vamlaul
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of UnmapMainImage
      PID:1852

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~3\Mozilla\jydekdj.exe

    Filesize

    558KB

    MD5

    98cc1993f6abeaf65eaeba0ebc7f6f8b

    SHA1

    e707157a45519d8f169c0f85a4f88a9e8ba92d3d

    SHA256

    f6f348409c416473d0ea956785e7e6ed94c879a9897a83e2450ac38a8a8c5f42

    SHA512

    d85d1e860ca89f7fdffaa46e952a409328ca046a7c28cceed4ad7bddbd5bf7dc8f41e1a33a84e41d01973a396e8b1a9b478be6fb11f669514774778c96a33a0c

  • C:\PROGRA~3\Mozilla\jydekdj.exe

    Filesize

    558KB

    MD5

    98cc1993f6abeaf65eaeba0ebc7f6f8b

    SHA1

    e707157a45519d8f169c0f85a4f88a9e8ba92d3d

    SHA256

    f6f348409c416473d0ea956785e7e6ed94c879a9897a83e2450ac38a8a8c5f42

    SHA512

    d85d1e860ca89f7fdffaa46e952a409328ca046a7c28cceed4ad7bddbd5bf7dc8f41e1a33a84e41d01973a396e8b1a9b478be6fb11f669514774778c96a33a0c

  • memory/588-54-0x0000000075881000-0x0000000075883000-memory.dmp

    Filesize

    8KB

  • memory/588-55-0x0000000001BD0000-0x0000000001C2B000-memory.dmp

    Filesize

    364KB

  • memory/588-56-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/588-57-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/588-58-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/1852-60-0x0000000000000000-mapping.dmp

  • memory/1852-63-0x00000000002B0000-0x000000000030B000-memory.dmp

    Filesize

    364KB

  • memory/1852-64-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/1852-65-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/1852-66-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB