Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    06-03-2024 18:37

General

  • Target

    2ddaaf5fad0dd05ce2e7fa24f22c4ec92659253de3db2a3c0abda2d8a21912a8.exe

  • Size

    213KB

  • MD5

    019b1c16d2d9003f04c2d7efa9917059

  • SHA1

    dda80eda77dd345219bab319d4766602f9335699

  • SHA256

    2ddaaf5fad0dd05ce2e7fa24f22c4ec92659253de3db2a3c0abda2d8a21912a8

  • SHA512

    e393e0f7d3a26a1013b873d41193e27b06e85565e6a8d613da854ab56dfb41df63eefa2e85c61fd933f7702728169e1f6650ec92c0ad2332dfc8c7f78780a247

  • SSDEEP

    6144:p44b7czAEYdlyp6rswaDqKgL08qvFsRc2:m4fiQdlnoxgYlvy1

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ddaaf5fad0dd05ce2e7fa24f22c4ec92659253de3db2a3c0abda2d8a21912a8.exe
    "C:\Users\Admin\AppData\Local\Temp\2ddaaf5fad0dd05ce2e7fa24f22c4ec92659253de3db2a3c0abda2d8a21912a8.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of UnmapMainImage
    PID:2100
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {66B7BB6E-E411-46AD-8C5C-878FC2BF6C06} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2464
    • C:\PROGRA~3\Mozilla\pfwoyhh.exe
      C:\PROGRA~3\Mozilla\pfwoyhh.exe -zhxzcvh
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of UnmapMainImage
      PID:3008

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~3\Mozilla\pfwoyhh.exe

    Filesize

    213KB

    MD5

    e1e2a902b601be238397b490244a6908

    SHA1

    ec18f7a5eda7e5654b52bb2dd63adc70e2fde314

    SHA256

    b4ba5f7c30a47200bbadc1a79165c87a6b5bc9395a1b170111a19aca0c4715a2

    SHA512

    ec0cd48e1131fa9df74994dee66033ebf3ed2395b76bd7825d7ee12d9f50dd1c2b07cf779e9f1db558dc0fae855b525c9ad228de7a17deec3392a80841361e73

  • memory/2100-1-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2100-0-0x0000000000460000-0x00000000004BB000-memory.dmp

    Filesize

    364KB

  • memory/2100-3-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/3008-6-0x00000000002E0000-0x000000000033B000-memory.dmp

    Filesize

    364KB

  • memory/3008-7-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/3008-9-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB