Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
15-10-2023 19:48
Static task
static1
Behavioral task
behavioral1
Sample
e363f77cabd6bc46552e597ee531fd10_exe32.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e363f77cabd6bc46552e597ee531fd10_exe32.exe
Resource
win10v2004-20230915-en
General
-
Target
e363f77cabd6bc46552e597ee531fd10_exe32.exe
-
Size
249KB
-
MD5
e363f77cabd6bc46552e597ee531fd10
-
SHA1
8cf70557214afbe8f122a5aa2f28fd5eafcd9674
-
SHA256
3b900a71f21164ee37d652a9f697ac2131bd931afa4f36e0fabc976399340dee
-
SHA512
e4282064e13bf084c19cdbacc41d113a05b6fad4e5084b70ffb319731b58b0df3a3f49b5113c159bdc6548d633ac502077a8c6eae5ac68d2638b2870a5891c6c
-
SSDEEP
6144:7sZJCstu4PJg5/Ly0d8YaDRVHTVtSbGqJL:Yy5zyNYaHHDSb
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2652 aaacbzj.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\aaacbzj.exe e363f77cabd6bc46552e597ee531fd10_exe32.exe File created C:\PROGRA~3\Mozilla\epqxpia.dll aaacbzj.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2232 e363f77cabd6bc46552e597ee531fd10_exe32.exe 2652 aaacbzj.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1464 wrote to memory of 2652 1464 taskeng.exe 29 PID 1464 wrote to memory of 2652 1464 taskeng.exe 29 PID 1464 wrote to memory of 2652 1464 taskeng.exe 29 PID 1464 wrote to memory of 2652 1464 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\e363f77cabd6bc46552e597ee531fd10_exe32.exe"C:\Users\Admin\AppData\Local\Temp\e363f77cabd6bc46552e597ee531fd10_exe32.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2232
-
C:\Windows\system32\taskeng.exetaskeng.exe {66730856-56C2-468E-AB6D-DECADDF87CEE} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\PROGRA~3\Mozilla\aaacbzj.exeC:\PROGRA~3\Mozilla\aaacbzj.exe -uzlnuvg2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
249KB
MD5237aef5cca33ed8d2c13898755ef3c11
SHA1f1dec6a496c16f438a6ef16faf3cc1f54e2fde25
SHA25629786fca66473dcc3715d63f04af13829011839a40dff72977f37eeb86cd05a4
SHA512d88a3aaf54bd318288795bb73eb0b71dd93b629b9b38f3903479079bf2c6281b9c1573a62fba17fd6f337d77eb2521a01c1f73909c68185d6daa8ab4afc365bb
-
Filesize
249KB
MD5237aef5cca33ed8d2c13898755ef3c11
SHA1f1dec6a496c16f438a6ef16faf3cc1f54e2fde25
SHA25629786fca66473dcc3715d63f04af13829011839a40dff72977f37eeb86cd05a4
SHA512d88a3aaf54bd318288795bb73eb0b71dd93b629b9b38f3903479079bf2c6281b9c1573a62fba17fd6f337d77eb2521a01c1f73909c68185d6daa8ab4afc365bb