Analysis

  • max time kernel
    119s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    15/10/2023, 19:47

General

  • Target

    d76c3cbeddb6fbfb95a7cb378c525df0_exe32.exe

  • Size

    150KB

  • MD5

    d76c3cbeddb6fbfb95a7cb378c525df0

  • SHA1

    16882883588967bd566e96ffd32be2f4db4deadf

  • SHA256

    ea95b4f5dfd987beec2aea48d09600f2c0e428e8e02dd1462fa6403062ce7f7b

  • SHA512

    10d612d4084c2a795eabc6a0e6f50b999003f358669d9803652451f475791b16b30821751f672f6d164884aa71f6b28b0b951b7bc16350f7896b32575da04462

  • SSDEEP

    3072:l4BMFM410Gcpqp+VRZPy8m8hhHPD3Lrn2rCeQReBB9IkkIbpP:lHFd10Gqa+VLy8meh73P2PQohbpP

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d76c3cbeddb6fbfb95a7cb378c525df0_exe32.exe
    "C:\Users\Admin\AppData\Local\Temp\d76c3cbeddb6fbfb95a7cb378c525df0_exe32.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3004
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {28568328-D72B-4925-8195-5ADE71A761F8} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2652
    • C:\PROGRA~3\Mozilla\xvqykzi.exe
      C:\PROGRA~3\Mozilla\xvqykzi.exe -tkarfve
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:2708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~3\Mozilla\xvqykzi.exe

    Filesize

    150KB

    MD5

    036fb4dd9c2486ac497e6dbb86fcd0fe

    SHA1

    bc0ce339484edc0baddada076abc9f4937233e65

    SHA256

    86d5d71d21bf832f32beee9ae09b1f3069c6afa5e3d2c4aca41bdc9eac371262

    SHA512

    9af0133c65fab67483e83fd898ae1da1c605eb13505dd42d7c47e422460292075588cf756c893a57277e4e3aa70d64d0d52c488c3e6cd52d081ce1754eb569f0

  • C:\PROGRA~3\Mozilla\xvqykzi.exe

    Filesize

    150KB

    MD5

    036fb4dd9c2486ac497e6dbb86fcd0fe

    SHA1

    bc0ce339484edc0baddada076abc9f4937233e65

    SHA256

    86d5d71d21bf832f32beee9ae09b1f3069c6afa5e3d2c4aca41bdc9eac371262

    SHA512

    9af0133c65fab67483e83fd898ae1da1c605eb13505dd42d7c47e422460292075588cf756c893a57277e4e3aa70d64d0d52c488c3e6cd52d081ce1754eb569f0

  • memory/2708-12-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB

  • memory/2708-18-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB

  • memory/3004-1-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB

  • memory/3004-0-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB

  • memory/3004-2-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB

  • memory/3004-3-0x00000000003D0000-0x00000000003D1000-memory.dmp

    Filesize

    4KB

  • memory/3004-6-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB

  • memory/3004-7-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB

  • memory/3004-9-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB