Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
12-03-2024 22:48
Behavioral task
behavioral1
Sample
8edb7497f0524af271d09084ab8bff442866aff224c32826f2bb33d869f03356.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
8edb7497f0524af271d09084ab8bff442866aff224c32826f2bb33d869f03356.exe
Resource
win10v2004-20231215-en
General
-
Target
8edb7497f0524af271d09084ab8bff442866aff224c32826f2bb33d869f03356.exe
-
Size
377KB
-
MD5
27be19895ccb4c6e74f5835f3a2075f6
-
SHA1
ca8b7cc4741387130059c498c9f751e4dc338d78
-
SHA256
8edb7497f0524af271d09084ab8bff442866aff224c32826f2bb33d869f03356
-
SHA512
89ed259ce4995057bbc935b38201535f19afb5e493593e491868da9c3e168210d338fedb00efb8ec91f25fa6b41c0cb05e9aa2671455ff9379d5b9405f24c047
-
SSDEEP
6144:G72k0YujF59B+SNiT1SRws339pnPJ7ImcvKoSYxTg:0FxujX9B+lAb9ImhoSmTg
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 3 IoCs
resource yara_rule behavioral1/memory/2268-0-0x0000000000400000-0x000000000045F000-memory.dmp UPX behavioral1/files/0x000c000000014890-5.dat UPX behavioral1/memory/2936-7-0x0000000000400000-0x000000000045F000-memory.dmp UPX -
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2936 wrvdfyg.exe -
resource yara_rule behavioral1/memory/2268-0-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/files/0x000c000000014890-5.dat upx behavioral1/memory/2936-7-0x0000000000400000-0x000000000045F000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\wrvdfyg.exe 8edb7497f0524af271d09084ab8bff442866aff224c32826f2bb33d869f03356.exe File created C:\PROGRA~3\Mozilla\klztrnd.dll wrvdfyg.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2268 8edb7497f0524af271d09084ab8bff442866aff224c32826f2bb33d869f03356.exe 2936 wrvdfyg.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2936 2976 taskeng.exe 29 PID 2976 wrote to memory of 2936 2976 taskeng.exe 29 PID 2976 wrote to memory of 2936 2976 taskeng.exe 29 PID 2976 wrote to memory of 2936 2976 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\8edb7497f0524af271d09084ab8bff442866aff224c32826f2bb33d869f03356.exe"C:\Users\Admin\AppData\Local\Temp\8edb7497f0524af271d09084ab8bff442866aff224c32826f2bb33d869f03356.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2268
-
C:\Windows\system32\taskeng.exetaskeng.exe {0BBEF844-45EC-4561-8EF4-A6ECDEB32827} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\PROGRA~3\Mozilla\wrvdfyg.exeC:\PROGRA~3\Mozilla\wrvdfyg.exe -hzyjzia2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD555c62f34063fb7f767ae7a9e669f0fdb
SHA1d76bc53975022ac221e11a5d168ac690de9b84f8
SHA256c16b297f8fbee30d1d61e491b3fb6f785e894ce703c13e3ecd64e9825690b75f
SHA5125beb99c3b3cc1f6c3d3c5e7dffd7098102ea3652793a1fe72fc43315b68b2144709ec583fbd48ddb59da7e3caf1a0142d48efe7a289f0801612ddd2cf96116b3