Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/03/2024, 22:19
Static task
static1
Behavioral task
behavioral1
Sample
9f0cd6e78836efac81d673afc00deadbbb7427e1d7676cef2aba465ee50b237a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9f0cd6e78836efac81d673afc00deadbbb7427e1d7676cef2aba465ee50b237a.exe
Resource
win10v2004-20240226-en
General
-
Target
9f0cd6e78836efac81d673afc00deadbbb7427e1d7676cef2aba465ee50b237a.exe
-
Size
172KB
-
MD5
fcff9420e174fa800a15a71cf4e1b559
-
SHA1
4a324c37f64048828c60e98553bfd80e02d7c3ac
-
SHA256
9f0cd6e78836efac81d673afc00deadbbb7427e1d7676cef2aba465ee50b237a
-
SHA512
ae575276d1f714679a54a157113c6c912b583106a94a9e3d54bd04528b43883afb82dc0e03a6b0e869e6f105e8051c70f878191d3ac46d0bf264f40546da62e6
-
SSDEEP
3072:UFGkzbFMitLTV9Z9dv2dufUS+pNqwWeUaUEA6CNk28QFk2fhyTeacLv:B0bFHLTrh2fpJKtxNkWyTs
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2904 tbckyxk.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\tbckyxk.exe 9f0cd6e78836efac81d673afc00deadbbb7427e1d7676cef2aba465ee50b237a.exe File created C:\PROGRA~3\Mozilla\newtrln.dll tbckyxk.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2904 2688 taskeng.exe 29 PID 2688 wrote to memory of 2904 2688 taskeng.exe 29 PID 2688 wrote to memory of 2904 2688 taskeng.exe 29 PID 2688 wrote to memory of 2904 2688 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f0cd6e78836efac81d673afc00deadbbb7427e1d7676cef2aba465ee50b237a.exe"C:\Users\Admin\AppData\Local\Temp\9f0cd6e78836efac81d673afc00deadbbb7427e1d7676cef2aba465ee50b237a.exe"1⤵
- Drops file in Program Files directory
PID:1692
-
C:\Windows\system32\taskeng.exetaskeng.exe {FAA0541F-5615-4E2D-8538-ED4EE0BEF3E4} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\PROGRA~3\Mozilla\tbckyxk.exeC:\PROGRA~3\Mozilla\tbckyxk.exe -gqpcbye2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD52abb3ec93e0916d72b6e8864f964cb59
SHA1f74ea631032c325d797d06462f0c4d997c4d7bd2
SHA2562bcbde45c80eb23eb0f0fb4532f2277822e1a40265fec4026dde19b044c56f7d
SHA5125c090957cb305f2524c696c43eefbcd634d0cfa0ffa21bb7a280dc4bd641bfd085055cc1d553a8985406389f9a3c992d9e2e871ded389fb072742f16cd7939eb