Analysis
-
max time kernel
64s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 12:00
Static task
static1
Behavioral task
behavioral1
Sample
e0ec1a2ba6d64bf216d5c40fd4453452225c648c41a02c0f6b77eabaffd1090b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e0ec1a2ba6d64bf216d5c40fd4453452225c648c41a02c0f6b77eabaffd1090b.exe
Resource
win10v2004-20220812-en
General
-
Target
e0ec1a2ba6d64bf216d5c40fd4453452225c648c41a02c0f6b77eabaffd1090b.exe
-
Size
743KB
-
MD5
0ddadc685b4d6c0abf12237aab923880
-
SHA1
890d6c70df981161738c7dfdfd8c4190ce2841ef
-
SHA256
e0ec1a2ba6d64bf216d5c40fd4453452225c648c41a02c0f6b77eabaffd1090b
-
SHA512
f6b6665091902b21bf868c32c0a4b0e3df8087f8dab8e2741389678b38dadfe18e2e6c0d732d2d5e82a11bbeb479bc27e948ff452603f4d3b820f22fa71cf7d3
-
SSDEEP
12288:CDJM/bXntAh+nhZoqQEHvVIzJPz//DdvdYkNQX1NYtFX0jPDl5pudl1lnNRyV:Cd6atqLHNk5TdvKX1NYtFXOMNO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1708 sgfgrig.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\sgfgrig.exe e0ec1a2ba6d64bf216d5c40fd4453452225c648c41a02c0f6b77eabaffd1090b.exe File created C:\PROGRA~3\Mozilla\ogcwmgm.dll sgfgrig.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1940 wrote to memory of 1708 1940 taskeng.exe 29 PID 1940 wrote to memory of 1708 1940 taskeng.exe 29 PID 1940 wrote to memory of 1708 1940 taskeng.exe 29 PID 1940 wrote to memory of 1708 1940 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0ec1a2ba6d64bf216d5c40fd4453452225c648c41a02c0f6b77eabaffd1090b.exe"C:\Users\Admin\AppData\Local\Temp\e0ec1a2ba6d64bf216d5c40fd4453452225c648c41a02c0f6b77eabaffd1090b.exe"1⤵
- Drops file in Program Files directory
PID:1480
-
C:\Windows\system32\taskeng.exetaskeng.exe {7A87F41F-20DB-4085-8AC0-A58A30A5D213} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\PROGRA~3\Mozilla\sgfgrig.exeC:\PROGRA~3\Mozilla\sgfgrig.exe -smuvcxh2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1708
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
743KB
MD52ec101aa75132f7e82097569f44e500c
SHA1f4b593063bac8403808f290619b3485be4b4d12f
SHA256b62d439add34e0be5b99922ba4c26f98415395f6f866d62451902124f898ca8c
SHA512893ab79ff770344a57535fa734eba01d518b856470fb940841b03b37b8c0778fb939e4f23753cb1e6236003c544d0f8c15a8efe6b8271946ab84f832736b2fd6
-
Filesize
743KB
MD52ec101aa75132f7e82097569f44e500c
SHA1f4b593063bac8403808f290619b3485be4b4d12f
SHA256b62d439add34e0be5b99922ba4c26f98415395f6f866d62451902124f898ca8c
SHA512893ab79ff770344a57535fa734eba01d518b856470fb940841b03b37b8c0778fb939e4f23753cb1e6236003c544d0f8c15a8efe6b8271946ab84f832736b2fd6