Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-03-2024 20:56
Behavioral task
behavioral1
Sample
7c37786ee7bb9b601c196c02c892759ddc2dc79848697a6ef5d5e21eee7a969d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7c37786ee7bb9b601c196c02c892759ddc2dc79848697a6ef5d5e21eee7a969d.exe
Resource
win10v2004-20240226-en
General
-
Target
7c37786ee7bb9b601c196c02c892759ddc2dc79848697a6ef5d5e21eee7a969d.exe
-
Size
370KB
-
MD5
aef421fb933432e1c0a1fda32edc990d
-
SHA1
5e2cf6e6b91c8fecee1311ea0e536874e695e743
-
SHA256
7c37786ee7bb9b601c196c02c892759ddc2dc79848697a6ef5d5e21eee7a969d
-
SHA512
44beb3f8486313754a571e266c63330d4484c878a6b3d3a6f19272db7c7fde1956dbfcea940fb3a4809f188264c4b3849af89fd2987b271e724bbe207f0ac5e0
-
SSDEEP
6144:UHEagZcctnCqhPHbMMCji9B0AwV1OkF7YH62LIHO8OIANZwtvTvF9fj6:UHEagZccMIPHwxi9RwyxH61O8OIs02
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 3 IoCs
resource yara_rule behavioral1/memory/2476-0-0x0000000000400000-0x000000000045F000-memory.dmp UPX behavioral1/files/0x000b000000015bb9-5.dat UPX behavioral1/memory/3024-7-0x0000000000400000-0x000000000045F000-memory.dmp UPX -
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 3024 dbilzqh.exe -
resource yara_rule behavioral1/memory/2476-0-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/files/0x000b000000015bb9-5.dat upx behavioral1/memory/3024-7-0x0000000000400000-0x000000000045F000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\dbilzqh.exe 7c37786ee7bb9b601c196c02c892759ddc2dc79848697a6ef5d5e21eee7a969d.exe File created C:\PROGRA~3\Mozilla\zxoabnc.dll dbilzqh.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2476 7c37786ee7bb9b601c196c02c892759ddc2dc79848697a6ef5d5e21eee7a969d.exe 3024 dbilzqh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2572 wrote to memory of 3024 2572 taskeng.exe 29 PID 2572 wrote to memory of 3024 2572 taskeng.exe 29 PID 2572 wrote to memory of 3024 2572 taskeng.exe 29 PID 2572 wrote to memory of 3024 2572 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c37786ee7bb9b601c196c02c892759ddc2dc79848697a6ef5d5e21eee7a969d.exe"C:\Users\Admin\AppData\Local\Temp\7c37786ee7bb9b601c196c02c892759ddc2dc79848697a6ef5d5e21eee7a969d.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2476
-
C:\Windows\system32\taskeng.exetaskeng.exe {736EA1F5-D7F9-4F6F-ADD6-08567152617F} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\PROGRA~3\Mozilla\dbilzqh.exeC:\PROGRA~3\Mozilla\dbilzqh.exe -kwinamg2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
370KB
MD5aed948b774f40de70b6be0a7d4ffc9d1
SHA14c77dc5970f901a4462c697b5efebbfc8094057f
SHA2569ee41985c7755ea85d95e0f54e50a859a740cc0622bc52670ba84af282635eef
SHA51281b67eff29a883116e48d95a5f23d692e943cffde4800c98d0d201ff0f343d2f4c884e300b57ff0cbf71ebfb9db39f504764a0425241300a6647f72392d80b1b