Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    15/10/2023, 19:41

General

  • Target

    99127360b9e6a34abad05c77d9c70510_exe32.exe

  • Size

    248KB

  • MD5

    99127360b9e6a34abad05c77d9c70510

  • SHA1

    685466b5f8de928a82cf1a4e96e0373da3226d16

  • SHA256

    cd78202bba6f9a41ee06693cece1d7202642572c77af2fb631afc689de90042c

  • SHA512

    c22bafa97134990a16a49323117321fee3c1167710f9951274930823c4f365eeda2ccf6f57986748663785a6d5f2d31ad2929788b98b9e1a0cd9168dfdafffdd

  • SSDEEP

    3072:hzjAuUfkkPk4wigPI9Bxqfs37ab9+Chj8eUu5J98WCNYMK6RsjFys4g6e:RVU0PI9Bxas37axX3Uu5BwXRsA46e

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\99127360b9e6a34abad05c77d9c70510_exe32.exe
    "C:\Users\Admin\AppData\Local\Temp\99127360b9e6a34abad05c77d9c70510_exe32.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of UnmapMainImage
    PID:1936
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {50D2325B-C9FB-4B47-A1A6-94FFBE7242BA} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2604
    • C:\PROGRA~3\Mozilla\ddhvolk.exe
      C:\PROGRA~3\Mozilla\ddhvolk.exe -nlwszjc
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of UnmapMainImage
      PID:2652

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\PROGRA~3\Mozilla\ddhvolk.exe

          Filesize

          248KB

          MD5

          07bbb758e64c34cc9c47c3e95354555f

          SHA1

          b639955a586ae08773f461cbe4bf5d4c2b80dce7

          SHA256

          77ea601a367a7b3df55e89e96a18a99bc653456a311ca4692df4aea1b73840f2

          SHA512

          2d7d19442902dc3b809292aa34b68bd5d93740157c97587f7f28163e07339d97e36d78f1ac5eac5eb81c3445eea3fe6f32c6a7a03308bda5379d2713d30c9683

        • C:\PROGRA~3\Mozilla\ddhvolk.exe

          Filesize

          248KB

          MD5

          07bbb758e64c34cc9c47c3e95354555f

          SHA1

          b639955a586ae08773f461cbe4bf5d4c2b80dce7

          SHA256

          77ea601a367a7b3df55e89e96a18a99bc653456a311ca4692df4aea1b73840f2

          SHA512

          2d7d19442902dc3b809292aa34b68bd5d93740157c97587f7f28163e07339d97e36d78f1ac5eac5eb81c3445eea3fe6f32c6a7a03308bda5379d2713d30c9683

        • memory/1936-0-0x0000000000400000-0x000000000045B000-memory.dmp

          Filesize

          364KB

        • memory/1936-1-0x0000000000400000-0x000000000045B000-memory.dmp

          Filesize

          364KB

        • memory/1936-2-0x0000000001B80000-0x0000000001BDB000-memory.dmp

          Filesize

          364KB

        • memory/1936-4-0x0000000000400000-0x000000000045B000-memory.dmp

          Filesize

          364KB

        • memory/2652-7-0x0000000000250000-0x00000000002AB000-memory.dmp

          Filesize

          364KB

        • memory/2652-8-0x0000000000400000-0x000000000045B000-memory.dmp

          Filesize

          364KB

        • memory/2652-10-0x0000000000400000-0x000000000045B000-memory.dmp

          Filesize

          364KB

        • memory/2652-11-0x0000000000250000-0x00000000002AB000-memory.dmp

          Filesize

          364KB