Analysis
-
max time kernel
45s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 10:23
Static task
static1
Behavioral task
behavioral1
Sample
227d2de9b1d81793c0eb92e759e3b5cf848a5982ed044f94ff10642941ea00a4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
227d2de9b1d81793c0eb92e759e3b5cf848a5982ed044f94ff10642941ea00a4.exe
Resource
win10v2004-20221111-en
General
-
Target
227d2de9b1d81793c0eb92e759e3b5cf848a5982ed044f94ff10642941ea00a4.exe
-
Size
140KB
-
MD5
2dc51894de6ddc0f2917e7133f204ca0
-
SHA1
84af8133d1d8a0619c9922fb137d07edae849c9e
-
SHA256
227d2de9b1d81793c0eb92e759e3b5cf848a5982ed044f94ff10642941ea00a4
-
SHA512
db1b1d92327794af80726472226d5b6a9194505be6d7f137ccd9d9b1375960dd7f1ca3b1234452330b627fe9d7b36da33bd9a7d09ad56847b6542aaefcf595a8
-
SSDEEP
3072:pidj6ShhYRa3SXjF/HvD9hQU7OCyIjAYxRwmdPkmkWt+3t97SVKmHkp:pEjpvYc3YJ/HvD9hTKCyI7TwmdMlL99N
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1096 jjruejn.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\jjruejn.exe 227d2de9b1d81793c0eb92e759e3b5cf848a5982ed044f94ff10642941ea00a4.exe File created C:\PROGRA~3\Mozilla\segfnra.dll jjruejn.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1620 wrote to memory of 1096 1620 taskeng.exe 28 PID 1620 wrote to memory of 1096 1620 taskeng.exe 28 PID 1620 wrote to memory of 1096 1620 taskeng.exe 28 PID 1620 wrote to memory of 1096 1620 taskeng.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\227d2de9b1d81793c0eb92e759e3b5cf848a5982ed044f94ff10642941ea00a4.exe"C:\Users\Admin\AppData\Local\Temp\227d2de9b1d81793c0eb92e759e3b5cf848a5982ed044f94ff10642941ea00a4.exe"1⤵
- Drops file in Program Files directory
PID:1308
-
C:\Windows\system32\taskeng.exetaskeng.exe {EEF67EFF-EEF1-45C6-B426-0AFD5E438F3E} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\PROGRA~3\Mozilla\jjruejn.exeC:\PROGRA~3\Mozilla\jjruejn.exe -npivonl2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1096
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD514f5829076a835852109f9e3a6fe7b7c
SHA1cbdf289234b118c1b192bd8eafa3adffc4c919f1
SHA2563408b41c1f3b4e42d3001e31ce3037943f0ad6f53f57cfded7ce4468e5e8563f
SHA512e89ea7bf2fe9cfe3eebb0163905040e89aa597598f5a0a99478d7459d0041668d3a114b0f06966d83d86c0fda7d455771bfb7906268e8a8b96c30724d4b0aa30
-
Filesize
140KB
MD514f5829076a835852109f9e3a6fe7b7c
SHA1cbdf289234b118c1b192bd8eafa3adffc4c919f1
SHA2563408b41c1f3b4e42d3001e31ce3037943f0ad6f53f57cfded7ce4468e5e8563f
SHA512e89ea7bf2fe9cfe3eebb0163905040e89aa597598f5a0a99478d7459d0041668d3a114b0f06966d83d86c0fda7d455771bfb7906268e8a8b96c30724d4b0aa30