Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 01:48
Static task
static1
Behavioral task
behavioral1
Sample
0a9f5957795a4fc262c7c94616a9c402.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0a9f5957795a4fc262c7c94616a9c402.exe
Resource
win10v2004-20231222-en
General
-
Target
0a9f5957795a4fc262c7c94616a9c402.exe
-
Size
201KB
-
MD5
0a9f5957795a4fc262c7c94616a9c402
-
SHA1
8c826f7c5f7a42267a32e739943f6f56b6ef790a
-
SHA256
a07b007e5d8b779a892bd7e61155ae66ddc8c0f79928d4138dbceaa573fb28dc
-
SHA512
34730da8743acbb4faa24c80074adef428ae344cba90b1f58f49c79558fa96311edbf23a87dcd885367f30d1b00962fe0ded747c7a0155d655500ad48f1bedcb
-
SSDEEP
3072:Bih0fMFfugUVg+/to3AbyaTzEfKi9Rv2PNpWJJpO3+KwIZxoUVVZWKbLqvTbI:0h0fUWgUVBWwWOErvEeof5ZzVeKPaTbI
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2412 gzwkojn.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\gzwkojn.exe 0a9f5957795a4fc262c7c94616a9c402.exe File created C:\PROGRA~3\Mozilla\frpqpya.dll gzwkojn.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2220 0a9f5957795a4fc262c7c94616a9c402.exe 2412 gzwkojn.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2412 3020 taskeng.exe 29 PID 3020 wrote to memory of 2412 3020 taskeng.exe 29 PID 3020 wrote to memory of 2412 3020 taskeng.exe 29 PID 3020 wrote to memory of 2412 3020 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a9f5957795a4fc262c7c94616a9c402.exe"C:\Users\Admin\AppData\Local\Temp\0a9f5957795a4fc262c7c94616a9c402.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2220
-
C:\Windows\system32\taskeng.exetaskeng.exe {3BCB17AD-43A2-4C59-A68B-CA0F6732E61D} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\PROGRA~3\Mozilla\gzwkojn.exeC:\PROGRA~3\Mozilla\gzwkojn.exe -mboiwvk2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD596495207362441d9118cd4e31aa148c6
SHA1d4cad4a042ebe31d868190fa621f0469c852498a
SHA2561d9b784e3a97ba62a8bafd61c1efb88e4d3f8aa0f0934419c910a55414ebbda2
SHA51242e76c3d8fad85ae53fb1c87e7ec55cb64544615f20fb5e223d243a40263c08ce20def162ada783cff7ee4ad4f0bc74fb5587aec8e3ead334640d5fb726fa6e8
-
Filesize
8KB
MD5054efb5cf98e36d2956a45bef243ca60
SHA141b629a6d236d54d316940906e5c36348ff6a88c
SHA256f5a1f698b85b023ab99f8a258621d87fa7a12d061a515e933e0ebc4f17ca2dc0
SHA5128f2ca54888b2ab748bb3dc50612e9f56d3438d0745820ffe84f04b21556548197dec2d2e8d1cbdfdf7aa246279db5e97c68b332e5d73dea001d441eacf333b20