Analysis
-
max time kernel
205s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 13:27
Static task
static1
Behavioral task
behavioral1
Sample
7a3af9d37a25b670b944bcaad432e939cab02132a5fad8f6d8b0fbcd693689fc.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7a3af9d37a25b670b944bcaad432e939cab02132a5fad8f6d8b0fbcd693689fc.exe
Resource
win10v2004-20221111-en
General
-
Target
7a3af9d37a25b670b944bcaad432e939cab02132a5fad8f6d8b0fbcd693689fc.exe
-
Size
229KB
-
MD5
3366663148bb0811ba305419999946b0
-
SHA1
2202dab50434791c05fe93c776d1ea28e814ceb4
-
SHA256
7a3af9d37a25b670b944bcaad432e939cab02132a5fad8f6d8b0fbcd693689fc
-
SHA512
21d9f80934f863a1f6f426311015414d328bba0db826cb208cf18b67142fd7dbdcbc432191b4f8b219ed027489b0a5dbf798f8b9f0716f2ef944cb864c6994c0
-
SSDEEP
6144:UHYagFwoZ7m6hjHq4ElCE+kF7YHWqnI/OIO0cNtExvHvpW:UHYagFwoI4jHBJxHWlOIO0cMs
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1668 aqlfwcc.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\aqlfwcc.exe 7a3af9d37a25b670b944bcaad432e939cab02132a5fad8f6d8b0fbcd693689fc.exe File created C:\PROGRA~3\Mozilla\yiqzwmf.dll aqlfwcc.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1516 7a3af9d37a25b670b944bcaad432e939cab02132a5fad8f6d8b0fbcd693689fc.exe 1668 aqlfwcc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1400 wrote to memory of 1668 1400 taskeng.exe 29 PID 1400 wrote to memory of 1668 1400 taskeng.exe 29 PID 1400 wrote to memory of 1668 1400 taskeng.exe 29 PID 1400 wrote to memory of 1668 1400 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a3af9d37a25b670b944bcaad432e939cab02132a5fad8f6d8b0fbcd693689fc.exe"C:\Users\Admin\AppData\Local\Temp\7a3af9d37a25b670b944bcaad432e939cab02132a5fad8f6d8b0fbcd693689fc.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1516
-
C:\Windows\system32\taskeng.exetaskeng.exe {9D77C714-3C0F-442A-ADF8-F6C9C6E8D363} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\PROGRA~3\Mozilla\aqlfwcc.exeC:\PROGRA~3\Mozilla\aqlfwcc.exe -ielcujk2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1668
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229KB
MD56c47dd5c7b2a9c6cd02eabb4cc469959
SHA11b8de759fb9fe84baba2898bbe755b2e9f9a2669
SHA25696e62e45af5162da0f6e06b2376102f709370d08e0eff28a7fa111d934db5efb
SHA5121ed95135d3a9aa306e6d06cb1daed37df1971050738c438412b5a725e87df2d06d5c5d03df5b33e577044d80f022a4a855af3c249c367c2b2f03d74f1dc8a8a0
-
Filesize
229KB
MD56c47dd5c7b2a9c6cd02eabb4cc469959
SHA11b8de759fb9fe84baba2898bbe755b2e9f9a2669
SHA25696e62e45af5162da0f6e06b2376102f709370d08e0eff28a7fa111d934db5efb
SHA5121ed95135d3a9aa306e6d06cb1daed37df1971050738c438412b5a725e87df2d06d5c5d03df5b33e577044d80f022a4a855af3c249c367c2b2f03d74f1dc8a8a0