Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-03-2024 21:08
Static task
static1
Behavioral task
behavioral1
Sample
83d569563bc7bb6c0bd75831d1de5d7a000e735e82ba4e8927c57b52bc316127.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
83d569563bc7bb6c0bd75831d1de5d7a000e735e82ba4e8927c57b52bc316127.exe
Resource
win10v2004-20240226-en
General
-
Target
83d569563bc7bb6c0bd75831d1de5d7a000e735e82ba4e8927c57b52bc316127.exe
-
Size
137KB
-
MD5
3d142afc9ea9c1505a889ada3e6490be
-
SHA1
ec699ae9291f2d5f398ccd2b92377d7cca0a36fb
-
SHA256
83d569563bc7bb6c0bd75831d1de5d7a000e735e82ba4e8927c57b52bc316127
-
SHA512
16dbc86de5b5411f4ceceabdba2b3f418022b4a2635835acb0561228c0de967e74b0d411eab82338411b6620d6cf016b52f004d66d9a59a0beda25f5c1b45b77
-
SSDEEP
3072:jifwJhNW+Bi8Hd9x5kxAIoqqZaxJtV3hiIEzW4:jywJhNW+Bi8Hd8UZZO3hiIIW4
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2104 mgbxiii.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\mgbxiii.exe 83d569563bc7bb6c0bd75831d1de5d7a000e735e82ba4e8927c57b52bc316127.exe File created C:\PROGRA~3\Mozilla\iudaoda.dll mgbxiii.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2104 2460 taskeng.exe 29 PID 2460 wrote to memory of 2104 2460 taskeng.exe 29 PID 2460 wrote to memory of 2104 2460 taskeng.exe 29 PID 2460 wrote to memory of 2104 2460 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\83d569563bc7bb6c0bd75831d1de5d7a000e735e82ba4e8927c57b52bc316127.exe"C:\Users\Admin\AppData\Local\Temp\83d569563bc7bb6c0bd75831d1de5d7a000e735e82ba4e8927c57b52bc316127.exe"1⤵
- Drops file in Program Files directory
PID:2344
-
C:\Windows\system32\taskeng.exetaskeng.exe {DB1FEC34-8504-48EE-9CB3-0A1E9882E317} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\PROGRA~3\Mozilla\mgbxiii.exeC:\PROGRA~3\Mozilla\mgbxiii.exe -ccvrhxi2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
137KB
MD51aeb43343e6e36c55d6168495ab7478f
SHA111f9b1ba80f5503d63256f0f91fec03d75587fbc
SHA256c25d01c157ffee117a56d0efcc0cfb08ed947cf69d0e3cb7f1df34ff2d7cbb7f
SHA512109486312469cbcae186bf60d71e4056f93cad3b029bf169ec420df714e214d7589c6c824f97a956f000b7fd835979bed780348c2c7c93cefbe4e7513ba50e42