Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
15/10/2023, 19:41
Static task
static1
Behavioral task
behavioral1
Sample
99127360b9e6a34abad05c77d9c70510_exe32.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
99127360b9e6a34abad05c77d9c70510_exe32.exe
Resource
win10v2004-20230915-en
General
-
Target
99127360b9e6a34abad05c77d9c70510_exe32.exe
-
Size
248KB
-
MD5
99127360b9e6a34abad05c77d9c70510
-
SHA1
685466b5f8de928a82cf1a4e96e0373da3226d16
-
SHA256
cd78202bba6f9a41ee06693cece1d7202642572c77af2fb631afc689de90042c
-
SHA512
c22bafa97134990a16a49323117321fee3c1167710f9951274930823c4f365eeda2ccf6f57986748663785a6d5f2d31ad2929788b98b9e1a0cd9168dfdafffdd
-
SSDEEP
3072:hzjAuUfkkPk4wigPI9Bxqfs37ab9+Chj8eUu5J98WCNYMK6RsjFys4g6e:RVU0PI9Bxas37axX3Uu5BwXRsA46e
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2652 ddhvolk.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\ddhvolk.exe 99127360b9e6a34abad05c77d9c70510_exe32.exe File created C:\PROGRA~3\Mozilla\fuzozwc.dll ddhvolk.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1936 99127360b9e6a34abad05c77d9c70510_exe32.exe 2652 ddhvolk.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2652 2604 taskeng.exe 29 PID 2604 wrote to memory of 2652 2604 taskeng.exe 29 PID 2604 wrote to memory of 2652 2604 taskeng.exe 29 PID 2604 wrote to memory of 2652 2604 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\99127360b9e6a34abad05c77d9c70510_exe32.exe"C:\Users\Admin\AppData\Local\Temp\99127360b9e6a34abad05c77d9c70510_exe32.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1936
-
C:\Windows\system32\taskeng.exetaskeng.exe {50D2325B-C9FB-4B47-A1A6-94FFBE7242BA} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\PROGRA~3\Mozilla\ddhvolk.exeC:\PROGRA~3\Mozilla\ddhvolk.exe -nlwszjc2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248KB
MD507bbb758e64c34cc9c47c3e95354555f
SHA1b639955a586ae08773f461cbe4bf5d4c2b80dce7
SHA25677ea601a367a7b3df55e89e96a18a99bc653456a311ca4692df4aea1b73840f2
SHA5122d7d19442902dc3b809292aa34b68bd5d93740157c97587f7f28163e07339d97e36d78f1ac5eac5eb81c3445eea3fe6f32c6a7a03308bda5379d2713d30c9683
-
Filesize
248KB
MD507bbb758e64c34cc9c47c3e95354555f
SHA1b639955a586ae08773f461cbe4bf5d4c2b80dce7
SHA25677ea601a367a7b3df55e89e96a18a99bc653456a311ca4692df4aea1b73840f2
SHA5122d7d19442902dc3b809292aa34b68bd5d93740157c97587f7f28163e07339d97e36d78f1ac5eac5eb81c3445eea3fe6f32c6a7a03308bda5379d2713d30c9683