Analysis

  • max time kernel
    120s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13-03-2024 21:08

General

  • Target

    83d569563bc7bb6c0bd75831d1de5d7a000e735e82ba4e8927c57b52bc316127.exe

  • Size

    137KB

  • MD5

    3d142afc9ea9c1505a889ada3e6490be

  • SHA1

    ec699ae9291f2d5f398ccd2b92377d7cca0a36fb

  • SHA256

    83d569563bc7bb6c0bd75831d1de5d7a000e735e82ba4e8927c57b52bc316127

  • SHA512

    16dbc86de5b5411f4ceceabdba2b3f418022b4a2635835acb0561228c0de967e74b0d411eab82338411b6620d6cf016b52f004d66d9a59a0beda25f5c1b45b77

  • SSDEEP

    3072:jifwJhNW+Bi8Hd9x5kxAIoqqZaxJtV3hiIEzW4:jywJhNW+Bi8Hd8UZZO3hiIIW4

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\83d569563bc7bb6c0bd75831d1de5d7a000e735e82ba4e8927c57b52bc316127.exe
    "C:\Users\Admin\AppData\Local\Temp\83d569563bc7bb6c0bd75831d1de5d7a000e735e82ba4e8927c57b52bc316127.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2344
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {DB1FEC34-8504-48EE-9CB3-0A1E9882E317} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2460
    • C:\PROGRA~3\Mozilla\mgbxiii.exe
      C:\PROGRA~3\Mozilla\mgbxiii.exe -ccvrhxi
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:2104

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~3\Mozilla\mgbxiii.exe

    Filesize

    137KB

    MD5

    1aeb43343e6e36c55d6168495ab7478f

    SHA1

    11f9b1ba80f5503d63256f0f91fec03d75587fbc

    SHA256

    c25d01c157ffee117a56d0efcc0cfb08ed947cf69d0e3cb7f1df34ff2d7cbb7f

    SHA512

    109486312469cbcae186bf60d71e4056f93cad3b029bf169ec420df714e214d7589c6c824f97a956f000b7fd835979bed780348c2c7c93cefbe4e7513ba50e42

  • memory/2104-11-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2104-12-0x00000000007C0000-0x000000000081B000-memory.dmp

    Filesize

    364KB

  • memory/2104-19-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2344-0-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2344-1-0x0000000000220000-0x000000000027B000-memory.dmp

    Filesize

    364KB

  • memory/2344-8-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB