Analysis
-
max time kernel
122s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10/10/2023, 21:21
Static task
static1
Behavioral task
behavioral1
Sample
545234d8cf8bbda237f28ca5d6755170_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
545234d8cf8bbda237f28ca5d6755170_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
545234d8cf8bbda237f28ca5d6755170_JC.exe
-
Size
272KB
-
MD5
545234d8cf8bbda237f28ca5d6755170
-
SHA1
7dd53e4bc25e1745e38475e63ee52f864602a401
-
SHA256
3f238507b5338158a3eb4dc2302d68124888f10904da0477f6d68b5a9dab276a
-
SHA512
5e33c9c64dfc76419395585a557ab6e684deb6e9bfa554fa02f023ae2dcddf38b7c79a92bd8bde864b8c460dcc90477b175bc3c6b5970dadb9f881dcd2a1f5db
-
SSDEEP
6144:eFpiTSfDhpOQAYg718kVFRCHplF6UTSbGqJuM:RTSfDh7AL18UwJbhTSn
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 1956 xvqykzi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\xvqykzi.exe 545234d8cf8bbda237f28ca5d6755170_JC.exe File created C:\PROGRA~3\Mozilla\zyfdqqb.dll xvqykzi.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2836 545234d8cf8bbda237f28ca5d6755170_JC.exe 1956 xvqykzi.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2200 wrote to memory of 1956 2200 taskeng.exe 31 PID 2200 wrote to memory of 1956 2200 taskeng.exe 31 PID 2200 wrote to memory of 1956 2200 taskeng.exe 31 PID 2200 wrote to memory of 1956 2200 taskeng.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\545234d8cf8bbda237f28ca5d6755170_JC.exe"C:\Users\Admin\AppData\Local\Temp\545234d8cf8bbda237f28ca5d6755170_JC.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2836
-
C:\Windows\system32\taskeng.exetaskeng.exe {F1C58D2F-872C-4C02-902A-842DCFCB8D10} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\PROGRA~3\Mozilla\xvqykzi.exeC:\PROGRA~3\Mozilla\xvqykzi.exe -tkarfve2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
272KB
MD565c745c317b779d67e2d1b462e3e241f
SHA10c29259609dd558b1877bcc5ddf4504f0db54be7
SHA256c22e64d605612a352381c602c127afb50c7b338997c6afffb43f56981ea54c64
SHA5121d9621e5a93c099b550cca3f169ba7d733372b4c48a06029a431d00b70a0815dea8227c8bdbfb050d4d0451f6dc2f304c1815fd569531e6964547cb7a2cfbb8b
-
Filesize
272KB
MD565c745c317b779d67e2d1b462e3e241f
SHA10c29259609dd558b1877bcc5ddf4504f0db54be7
SHA256c22e64d605612a352381c602c127afb50c7b338997c6afffb43f56981ea54c64
SHA5121d9621e5a93c099b550cca3f169ba7d733372b4c48a06029a431d00b70a0815dea8227c8bdbfb050d4d0451f6dc2f304c1815fd569531e6964547cb7a2cfbb8b