Analysis
-
max time kernel
13s -
max time network
27s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 22:21
Static task
static1
Behavioral task
behavioral1
Sample
538f723e0582849d3b5c51d75e351be914793ac7db3c89174f6e39269e0d2b4a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
538f723e0582849d3b5c51d75e351be914793ac7db3c89174f6e39269e0d2b4a.exe
Resource
win10v2004-20240226-en
General
-
Target
538f723e0582849d3b5c51d75e351be914793ac7db3c89174f6e39269e0d2b4a.exe
-
Size
148KB
-
MD5
32367b2b4bc81bcbb07e72e09c7c85de
-
SHA1
2081c46b3ec1b937c48d864e85666dfe607eb03f
-
SHA256
538f723e0582849d3b5c51d75e351be914793ac7db3c89174f6e39269e0d2b4a
-
SHA512
adb7362e705209872c63be6b86da6270c379d9c72f4f144e167374404ea7655bd613546ca37bfdc728c80c11d5eaab0630d2fe83f0c47b3764e2f6da4aca344f
-
SSDEEP
3072:2CMiqJl3v1S4AsvdhxBz8bNk/AKItB/pL/s9hlSLUFWzV:2CMzfM4vxBIO+XpDnUUzV
Malware Config
Signatures
-
Detects executables built or packed with MPress PE compressor 5 IoCs
resource yara_rule behavioral1/memory/2360-0-0x0000000000400000-0x0000000000429000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2360-7-0x0000000000400000-0x0000000000429000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x0030000000015c50-8.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/2552-10-0x0000000000400000-0x0000000000429000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2552-17-0x0000000000400000-0x0000000000429000-memory.dmp INDICATOR_EXE_Packed_MPress -
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2552 xobykzk.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\xobykzk.exe 538f723e0582849d3b5c51d75e351be914793ac7db3c89174f6e39269e0d2b4a.exe File created C:\PROGRA~3\Mozilla\yvzxgmj.dll xobykzk.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 844 wrote to memory of 2552 844 taskeng.exe 29 PID 844 wrote to memory of 2552 844 taskeng.exe 29 PID 844 wrote to memory of 2552 844 taskeng.exe 29 PID 844 wrote to memory of 2552 844 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\538f723e0582849d3b5c51d75e351be914793ac7db3c89174f6e39269e0d2b4a.exe"C:\Users\Admin\AppData\Local\Temp\538f723e0582849d3b5c51d75e351be914793ac7db3c89174f6e39269e0d2b4a.exe"1⤵
- Drops file in Program Files directory
PID:2360
-
C:\Windows\system32\taskeng.exetaskeng.exe {052D9948-D4E2-40B0-AFC4-5229EE98F25F} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:844 -
C:\PROGRA~3\Mozilla\xobykzk.exeC:\PROGRA~3\Mozilla\xobykzk.exe -clyupje2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD5fa4fea1450f705d9cd809fd27c2017cd
SHA157cd2ce443567506a8fe5be8a329a8d862444679
SHA25648de0ec7cfd408689e4a6ea70844f5107bc0e028ec8e713a26f8cf50de07568e
SHA5129974409f56fca287d76d19616ac2015f53306e8348036e0026f7c4326905128ff5b2b79275cbba1f6c5941106c457fa0ffb628e0d7475ef165b87b22d8a089e9