Analysis
-
max time kernel
122s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/03/2024, 20:13
Static task
static1
Behavioral task
behavioral1
Sample
6932dd905c6781d0ccdd2a18e342ba71e5f3b67bb79dd3eefb5db514900e9310.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6932dd905c6781d0ccdd2a18e342ba71e5f3b67bb79dd3eefb5db514900e9310.exe
Resource
win10v2004-20240226-en
General
-
Target
6932dd905c6781d0ccdd2a18e342ba71e5f3b67bb79dd3eefb5db514900e9310.exe
-
Size
205KB
-
MD5
d70e8e9cab7ce6336e43b61849909a72
-
SHA1
601542e7a9e21acd23c580991cadc5adba538262
-
SHA256
6932dd905c6781d0ccdd2a18e342ba71e5f3b67bb79dd3eefb5db514900e9310
-
SHA512
538b92e0c3c33cbb64146d960f096c5bd55bac332e960fdfb6b933b9ee2841af2af6718d79a1915b428b01902cd2024ed4543213971308c5bf0bf3d839bdfc24
-
SSDEEP
3072:2+ejgWgTsDAJJRjOV2/pwb5ryT5tlDhB2IFTLFZhh2D+0caj3kyRACHfx:qjg3JJF35tlDhB2Cn9ozHfx
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2648 xobykzk.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\xobykzk.exe 6932dd905c6781d0ccdd2a18e342ba71e5f3b67bb79dd3eefb5db514900e9310.exe File created C:\PROGRA~3\Mozilla\yvzxgmj.dll xobykzk.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1396 6932dd905c6781d0ccdd2a18e342ba71e5f3b67bb79dd3eefb5db514900e9310.exe 2648 xobykzk.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2648 2328 taskeng.exe 29 PID 2328 wrote to memory of 2648 2328 taskeng.exe 29 PID 2328 wrote to memory of 2648 2328 taskeng.exe 29 PID 2328 wrote to memory of 2648 2328 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\6932dd905c6781d0ccdd2a18e342ba71e5f3b67bb79dd3eefb5db514900e9310.exe"C:\Users\Admin\AppData\Local\Temp\6932dd905c6781d0ccdd2a18e342ba71e5f3b67bb79dd3eefb5db514900e9310.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1396
-
C:\Windows\system32\taskeng.exetaskeng.exe {DECB126A-987D-400D-B645-50B1A56ABB0A} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\PROGRA~3\Mozilla\xobykzk.exeC:\PROGRA~3\Mozilla\xobykzk.exe -clyupje2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD55cc26cb688aa02d7fe5328e7c328d20a
SHA16aa49002635d6b47cfccf32147a9ed866822511d
SHA25666fc66323a81c7aa4a6e2b4d70b83105715fb3fda60de8b1ea33e85ba2b2df73
SHA512d3c3af45573c45a1cc256ce5d17a77af46114678532848ff5dddd62a31d89be05e1858d601c96d1aff5f35f090b6018450dd08d32239c3c6bae4eb1ff56dfbcc