Analysis

  • max time kernel
    122s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10/10/2023, 21:21

General

  • Target

    545234d8cf8bbda237f28ca5d6755170_JC.exe

  • Size

    272KB

  • MD5

    545234d8cf8bbda237f28ca5d6755170

  • SHA1

    7dd53e4bc25e1745e38475e63ee52f864602a401

  • SHA256

    3f238507b5338158a3eb4dc2302d68124888f10904da0477f6d68b5a9dab276a

  • SHA512

    5e33c9c64dfc76419395585a557ab6e684deb6e9bfa554fa02f023ae2dcddf38b7c79a92bd8bde864b8c460dcc90477b175bc3c6b5970dadb9f881dcd2a1f5db

  • SSDEEP

    6144:eFpiTSfDhpOQAYg718kVFRCHplF6UTSbGqJuM:RTSfDh7AL18UwJbhTSn

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\545234d8cf8bbda237f28ca5d6755170_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\545234d8cf8bbda237f28ca5d6755170_JC.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of UnmapMainImage
    PID:2836
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {F1C58D2F-872C-4C02-902A-842DCFCB8D10} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2200
    • C:\PROGRA~3\Mozilla\xvqykzi.exe
      C:\PROGRA~3\Mozilla\xvqykzi.exe -tkarfve
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of UnmapMainImage
      PID:1956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~3\Mozilla\xvqykzi.exe

    Filesize

    272KB

    MD5

    65c745c317b779d67e2d1b462e3e241f

    SHA1

    0c29259609dd558b1877bcc5ddf4504f0db54be7

    SHA256

    c22e64d605612a352381c602c127afb50c7b338997c6afffb43f56981ea54c64

    SHA512

    1d9621e5a93c099b550cca3f169ba7d733372b4c48a06029a431d00b70a0815dea8227c8bdbfb050d4d0451f6dc2f304c1815fd569531e6964547cb7a2cfbb8b

  • C:\PROGRA~3\Mozilla\xvqykzi.exe

    Filesize

    272KB

    MD5

    65c745c317b779d67e2d1b462e3e241f

    SHA1

    0c29259609dd558b1877bcc5ddf4504f0db54be7

    SHA256

    c22e64d605612a352381c602c127afb50c7b338997c6afffb43f56981ea54c64

    SHA512

    1d9621e5a93c099b550cca3f169ba7d733372b4c48a06029a431d00b70a0815dea8227c8bdbfb050d4d0451f6dc2f304c1815fd569531e6964547cb7a2cfbb8b

  • memory/1956-9-0x0000000000260000-0x00000000002BC000-memory.dmp

    Filesize

    368KB

  • memory/1956-10-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/1956-13-0x0000000000260000-0x00000000002BC000-memory.dmp

    Filesize

    368KB

  • memory/1956-12-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2836-0-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2836-1-0x0000000000280000-0x00000000002DC000-memory.dmp

    Filesize

    368KB

  • memory/2836-2-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2836-4-0x0000000000280000-0x00000000002DC000-memory.dmp

    Filesize

    368KB

  • memory/2836-5-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2836-6-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB