Analysis
-
max time kernel
146s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2024, 23:03
Behavioral task
behavioral1
Sample
a62cbd252c60c6cfa6dd75ef50afbaafc3a7cc45676b187d2ad638543f160a38.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a62cbd252c60c6cfa6dd75ef50afbaafc3a7cc45676b187d2ad638543f160a38.exe
Resource
win10v2004-20240226-en
General
-
Target
a62cbd252c60c6cfa6dd75ef50afbaafc3a7cc45676b187d2ad638543f160a38.exe
-
Size
140KB
-
MD5
4c9b44e14c56808bdb8023bd81160b27
-
SHA1
c0c767592e2cd69af4bad203d763f9e3cc10d730
-
SHA256
a62cbd252c60c6cfa6dd75ef50afbaafc3a7cc45676b187d2ad638543f160a38
-
SHA512
6faa145db73a1a0d6d2c22b334a47f417bec40b6faf86c8fccb0207347f9a8b1d795572e9caafb17b0ace550fa5b6ffef2e40a3383d51ee615ee0b259cdc2925
-
SSDEEP
3072:ri0FEplmmNJ/CHd6bOjU2GNUWdyeERIdbph:lEr7J6rQ1NUWdyDRS
Malware Config
Signatures
-
Detects executables packed with ASPack 6 IoCs
resource yara_rule behavioral2/memory/4972-0-0x0000000000400000-0x000000000045E000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral2/memory/4972-1-0x0000000000400000-0x000000000045E000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral2/memory/4972-2-0x0000000000400000-0x000000000045E000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral2/files/0x0009000000023322-9.dat INDICATOR_EXE_Packed_ASPack behavioral2/memory/2200-12-0x0000000000400000-0x000000000045E000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral2/memory/2200-11-0x0000000000400000-0x000000000045E000-memory.dmp INDICATOR_EXE_Packed_ASPack -
Modifies AppInit DLL entries 2 TTPs
-
resource yara_rule behavioral2/files/0x0009000000023322-9.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 2200 xrwomfe.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\xrwomfe.exe a62cbd252c60c6cfa6dd75ef50afbaafc3a7cc45676b187d2ad638543f160a38.exe File created C:\PROGRA~3\Mozilla\xblkzla.dll xrwomfe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a62cbd252c60c6cfa6dd75ef50afbaafc3a7cc45676b187d2ad638543f160a38.exe"C:\Users\Admin\AppData\Local\Temp\a62cbd252c60c6cfa6dd75ef50afbaafc3a7cc45676b187d2ad638543f160a38.exe"1⤵
- Drops file in Program Files directory
PID:4972
-
C:\PROGRA~3\Mozilla\xrwomfe.exeC:\PROGRA~3\Mozilla\xrwomfe.exe -cybdupc1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2200
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1220 --field-trial-handle=2432,i,12161922670941700748,3348345705955601576,262144 --variations-seed-version /prefetch:81⤵PID:3208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD543fdeb58e60e9d65c82311a2a2345316
SHA1e588b40523f2a94f17f75b97bdc93dbbc30aa977
SHA256f6997729157414a58e5ad56f69622df5c14ae43eb912956fb165178a137f144f
SHA512b3e59d1ff360a5a60f07a3af3164f5187bcb3a1766fca322535767b8ed82d538fad869b40812dc326fdeab3613111245f19210d45aeb86039f6e72ba8b835fc5