Analysis
-
max time kernel
115s -
max time network
39s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 08:49
Static task
static1
Behavioral task
behavioral1
Sample
5c45a828f87693b676b48f8f101115213563b50d0955c2771606dbfd22ff7d74.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5c45a828f87693b676b48f8f101115213563b50d0955c2771606dbfd22ff7d74.exe
Resource
win10v2004-20221111-en
General
-
Target
5c45a828f87693b676b48f8f101115213563b50d0955c2771606dbfd22ff7d74.exe
-
Size
558KB
-
MD5
3372aa0bd4c0ccd2e7847fc32ef89340
-
SHA1
bbb61416c46fb035f41a6cd5c42247940c0502f8
-
SHA256
5c45a828f87693b676b48f8f101115213563b50d0955c2771606dbfd22ff7d74
-
SHA512
d6c95b353a50d582d6298e8d425b8af9b89a50945a76c9f78900c52cb2408ff1372be4236faf033ab2f88968d83a60eed4bf78fdd7baa5686dac5e8e8a52a073
-
SSDEEP
12288:Iu3URWtsYf8PemjE8h0UxH9ND6fvhMrf1seW2/ag2n+p:IkQe8PemjTh0Ul/8vh+qUA+p
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1852 jydekdj.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\jydekdj.exe 5c45a828f87693b676b48f8f101115213563b50d0955c2771606dbfd22ff7d74.exe File created C:\PROGRA~3\Mozilla\xdldjol.dll jydekdj.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 588 5c45a828f87693b676b48f8f101115213563b50d0955c2771606dbfd22ff7d74.exe 1852 jydekdj.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1480 wrote to memory of 1852 1480 taskeng.exe 29 PID 1480 wrote to memory of 1852 1480 taskeng.exe 29 PID 1480 wrote to memory of 1852 1480 taskeng.exe 29 PID 1480 wrote to memory of 1852 1480 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c45a828f87693b676b48f8f101115213563b50d0955c2771606dbfd22ff7d74.exe"C:\Users\Admin\AppData\Local\Temp\5c45a828f87693b676b48f8f101115213563b50d0955c2771606dbfd22ff7d74.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:588
-
C:\Windows\system32\taskeng.exetaskeng.exe {59AE4BBD-F34A-42F7-BE89-976DAF5CAF41} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\PROGRA~3\Mozilla\jydekdj.exeC:\PROGRA~3\Mozilla\jydekdj.exe -vamlaul2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1852
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
558KB
MD598cc1993f6abeaf65eaeba0ebc7f6f8b
SHA1e707157a45519d8f169c0f85a4f88a9e8ba92d3d
SHA256f6f348409c416473d0ea956785e7e6ed94c879a9897a83e2450ac38a8a8c5f42
SHA512d85d1e860ca89f7fdffaa46e952a409328ca046a7c28cceed4ad7bddbd5bf7dc8f41e1a33a84e41d01973a396e8b1a9b478be6fb11f669514774778c96a33a0c
-
Filesize
558KB
MD598cc1993f6abeaf65eaeba0ebc7f6f8b
SHA1e707157a45519d8f169c0f85a4f88a9e8ba92d3d
SHA256f6f348409c416473d0ea956785e7e6ed94c879a9897a83e2450ac38a8a8c5f42
SHA512d85d1e860ca89f7fdffaa46e952a409328ca046a7c28cceed4ad7bddbd5bf7dc8f41e1a33a84e41d01973a396e8b1a9b478be6fb11f669514774778c96a33a0c