Analysis
-
max time kernel
80s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 18:43
Static task
static1
Behavioral task
behavioral1
Sample
7ab904918245e700001e4f1749a025f0a987353f5a1dd2c8ecc98f8a49aebbe6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7ab904918245e700001e4f1749a025f0a987353f5a1dd2c8ecc98f8a49aebbe6.exe
Resource
win10v2004-20221111-en
General
-
Target
7ab904918245e700001e4f1749a025f0a987353f5a1dd2c8ecc98f8a49aebbe6.exe
-
Size
295KB
-
MD5
07f5c6801c27a6a0fcf48f9e2cfa7e68
-
SHA1
652fa0c2a850007b8e528a115e99cb5ec74da1e5
-
SHA256
7ab904918245e700001e4f1749a025f0a987353f5a1dd2c8ecc98f8a49aebbe6
-
SHA512
c5eb2d0ce6e84a3b8b8633634a41d05a199037954d09a2091940c18b1756dc5a7b103e175d4752c844eebdd14d7aeb5f44a585f159d9e89d3134f63adc29cb12
-
SSDEEP
3072:ZbTGwhOzs6FnYhH7Fr/iIozgq7BPbvALztvZyBAlhDTkPQIbRNx:YzzCLiI/q7livZ3h3kPQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 776 jydekdj.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\jydekdj.exe 7ab904918245e700001e4f1749a025f0a987353f5a1dd2c8ecc98f8a49aebbe6.exe File created C:\PROGRA~3\Mozilla\xdldjol.dll jydekdj.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 848 7ab904918245e700001e4f1749a025f0a987353f5a1dd2c8ecc98f8a49aebbe6.exe 776 jydekdj.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1068 wrote to memory of 776 1068 taskeng.exe 29 PID 1068 wrote to memory of 776 1068 taskeng.exe 29 PID 1068 wrote to memory of 776 1068 taskeng.exe 29 PID 1068 wrote to memory of 776 1068 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ab904918245e700001e4f1749a025f0a987353f5a1dd2c8ecc98f8a49aebbe6.exe"C:\Users\Admin\AppData\Local\Temp\7ab904918245e700001e4f1749a025f0a987353f5a1dd2c8ecc98f8a49aebbe6.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:848
-
C:\Windows\system32\taskeng.exetaskeng.exe {B7E65110-1BEF-4276-B9CF-168492037858} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\PROGRA~3\Mozilla\jydekdj.exeC:\PROGRA~3\Mozilla\jydekdj.exe -vamlaul2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:776
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
295KB
MD5fbf82d4d170d88eea9f3f77daadd91bf
SHA177c701d6b15491beb4f31db1a1272531c4c60845
SHA256d6ec7a2178c152d2fd311cea71cbca2ba5532caeef15fe8fb084915011ab9d0d
SHA5127ce6052331a7bee744131c28ee8549aba5ca9f315d49bdc0a79d7e920d3dbae157ecb85868ba420270916ce8bb9c670fab925e9d6af7c73562953f942b3ef39f
-
Filesize
295KB
MD5fbf82d4d170d88eea9f3f77daadd91bf
SHA177c701d6b15491beb4f31db1a1272531c4c60845
SHA256d6ec7a2178c152d2fd311cea71cbca2ba5532caeef15fe8fb084915011ab9d0d
SHA5127ce6052331a7bee744131c28ee8549aba5ca9f315d49bdc0a79d7e920d3dbae157ecb85868ba420270916ce8bb9c670fab925e9d6af7c73562953f942b3ef39f