Analysis
-
max time kernel
45s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 12:58
Static task
static1
Behavioral task
behavioral1
Sample
8b4cd6efc75e9e1c2d6581daec33212f82239e28429996f3d19e61a1254ed3f7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8b4cd6efc75e9e1c2d6581daec33212f82239e28429996f3d19e61a1254ed3f7.exe
Resource
win10v2004-20220812-en
General
-
Target
8b4cd6efc75e9e1c2d6581daec33212f82239e28429996f3d19e61a1254ed3f7.exe
-
Size
218KB
-
MD5
301c3b9d648bfd46e0d39a4b263adac0
-
SHA1
f948b04033e8aebc67d25475e182b43f79ebdb5b
-
SHA256
8b4cd6efc75e9e1c2d6581daec33212f82239e28429996f3d19e61a1254ed3f7
-
SHA512
f58f69b21e02ae6339b47739287ec0e5e38a749bcf291e51dc2850fbf97ac26a647df536fcbb88db31bf48fe7c569b30ea49af49962157e133a30a4b35b26bff
-
SSDEEP
3072:CcMNMs6pTpZlxROvGLvrIgoEBm4TVNxZIa+6HQB4MnOOOOygsTVSIUKXs5L:lM2l7jLvrSkZVjwtOOOOy5SIa5L
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 276 jjruejn.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\jjruejn.exe 8b4cd6efc75e9e1c2d6581daec33212f82239e28429996f3d19e61a1254ed3f7.exe File created C:\PROGRA~3\Mozilla\segfnra.dll jjruejn.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1252 8b4cd6efc75e9e1c2d6581daec33212f82239e28429996f3d19e61a1254ed3f7.exe 276 jjruejn.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 276 2040 taskeng.exe 28 PID 2040 wrote to memory of 276 2040 taskeng.exe 28 PID 2040 wrote to memory of 276 2040 taskeng.exe 28 PID 2040 wrote to memory of 276 2040 taskeng.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b4cd6efc75e9e1c2d6581daec33212f82239e28429996f3d19e61a1254ed3f7.exe"C:\Users\Admin\AppData\Local\Temp\8b4cd6efc75e9e1c2d6581daec33212f82239e28429996f3d19e61a1254ed3f7.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1252
-
C:\Windows\system32\taskeng.exetaskeng.exe {A2E7C844-B589-43EE-9421-D1CFC30B60C9} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\PROGRA~3\Mozilla\jjruejn.exeC:\PROGRA~3\Mozilla\jjruejn.exe -npivonl2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:276
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
218KB
MD5160f6bb55f44a0102971d0effd19ab8d
SHA1ddffb4572f861b92f7b02ed6122aa75d1eb11fad
SHA256f1b2e51e4deb381e92e98f0aa7f9911468906434184c60c8c47c704d6a0fcb57
SHA512f50b5e2e9c424f56e87220c0f4c066d36f8f05646cee154d65fc59fb769319a2110532bee0bd4b1f7b52f7edbfb916b6992f3be4307c52d909182ace83f68a20
-
Filesize
218KB
MD5160f6bb55f44a0102971d0effd19ab8d
SHA1ddffb4572f861b92f7b02ed6122aa75d1eb11fad
SHA256f1b2e51e4deb381e92e98f0aa7f9911468906434184c60c8c47c704d6a0fcb57
SHA512f50b5e2e9c424f56e87220c0f4c066d36f8f05646cee154d65fc59fb769319a2110532bee0bd4b1f7b52f7edbfb916b6992f3be4307c52d909182ace83f68a20