Analysis
-
max time kernel
41s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 12:14
Static task
static1
Behavioral task
behavioral1
Sample
d9a6efb96912a3a21fdf2048ef04c3c0d8068d8e3b6bb8ae95b81006a1d921dd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d9a6efb96912a3a21fdf2048ef04c3c0d8068d8e3b6bb8ae95b81006a1d921dd.exe
Resource
win10v2004-20220812-en
General
-
Target
d9a6efb96912a3a21fdf2048ef04c3c0d8068d8e3b6bb8ae95b81006a1d921dd.exe
-
Size
232KB
-
MD5
3ddc8b3f01cda352dc6544d8ee991570
-
SHA1
daabcd6726879bf2402402a02d4ed0c251c45524
-
SHA256
d9a6efb96912a3a21fdf2048ef04c3c0d8068d8e3b6bb8ae95b81006a1d921dd
-
SHA512
759d669a51b8ada3cc7a4d8129000a211177f7c41e7f75b7a9887dc6c036ecbb99e3c4331c58c9bdc833fad0e21424331a316735f587696c9e2e793be918a0b0
-
SSDEEP
3072:fs5jAp7XSXDHAGjTmwoI+2Msl1gwW/ZJK7bJ1A50MW5UtU88q/S2jbxWGqJsE:fsapAL/jTroImi1ArWOtU8J/SbGqJf
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2036 nswitkh.exe -
Modifies AppInit DLL entries 2 TTPs
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\nswitkh.exe d9a6efb96912a3a21fdf2048ef04c3c0d8068d8e3b6bb8ae95b81006a1d921dd.exe File created C:\PROGRA~3\Mozilla\zgooxfa.dll nswitkh.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1532 d9a6efb96912a3a21fdf2048ef04c3c0d8068d8e3b6bb8ae95b81006a1d921dd.exe 2036 nswitkh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1528 wrote to memory of 2036 1528 taskeng.exe 28 PID 1528 wrote to memory of 2036 1528 taskeng.exe 28 PID 1528 wrote to memory of 2036 1528 taskeng.exe 28 PID 1528 wrote to memory of 2036 1528 taskeng.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9a6efb96912a3a21fdf2048ef04c3c0d8068d8e3b6bb8ae95b81006a1d921dd.exe"C:\Users\Admin\AppData\Local\Temp\d9a6efb96912a3a21fdf2048ef04c3c0d8068d8e3b6bb8ae95b81006a1d921dd.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1532
-
C:\Windows\system32\taskeng.exetaskeng.exe {4C7D1597-C693-4AF6-A6B8-B691C2B6ADED} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\PROGRA~3\Mozilla\nswitkh.exeC:\PROGRA~3\Mozilla\nswitkh.exe -vhgoixm2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2036
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD5b824ab54360d58dcea1054673894c2db
SHA1eec7a0ccdc190dd593ba4acf7dde42c499f2efc5
SHA256f582e21aac260302f15b24d1efb0dac477d724478733b6bea4fc07f9fb6f34e5
SHA512787d75ab59081d2192b93d5f75f4f2bfd062a5e6e4edd02f0f29d07b717e2ceb4eb7eb9a1e3974bb96bded12c882dcf55902dd3a1a336829b47c5fda3e26b442
-
Filesize
232KB
MD5b824ab54360d58dcea1054673894c2db
SHA1eec7a0ccdc190dd593ba4acf7dde42c499f2efc5
SHA256f582e21aac260302f15b24d1efb0dac477d724478733b6bea4fc07f9fb6f34e5
SHA512787d75ab59081d2192b93d5f75f4f2bfd062a5e6e4edd02f0f29d07b717e2ceb4eb7eb9a1e3974bb96bded12c882dcf55902dd3a1a336829b47c5fda3e26b442