Analysis
-
max time kernel
119s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/03/2024, 00:24
Static task
static1
Behavioral task
behavioral1
Sample
d7e2ea70b932d0914c6dffebf580b7ef965d0c0305b95fafd57d71669375c71f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d7e2ea70b932d0914c6dffebf580b7ef965d0c0305b95fafd57d71669375c71f.exe
Resource
win10v2004-20240226-en
General
-
Target
d7e2ea70b932d0914c6dffebf580b7ef965d0c0305b95fafd57d71669375c71f.exe
-
Size
153KB
-
MD5
bbda038417323fdf69c0d22a3945a612
-
SHA1
ecd721decf185db461f7f2aadf3897097b326c69
-
SHA256
d7e2ea70b932d0914c6dffebf580b7ef965d0c0305b95fafd57d71669375c71f
-
SHA512
bb896a8266d7b41b632dd08e50249b500a6294e012d06b9aa2b01bd361e0d3dc5731c7da6c88f1afd14b69ed021f1eb8b5308b29b24e2b2631afc3a9342bd6e3
-
SSDEEP
3072:ZHrEI6rvvMV0nE17B+TnFnW5/bi13lNvuCLeEPbUXHrJ61ej/:5wHMV0nE1l+LtuTS/aSUXLJZ
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2636 ydvbdjf.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\ydvbdjf.exe d7e2ea70b932d0914c6dffebf580b7ef965d0c0305b95fafd57d71669375c71f.exe File created C:\PROGRA~3\Mozilla\agmxqzf.dll ydvbdjf.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2636 2544 taskeng.exe 29 PID 2544 wrote to memory of 2636 2544 taskeng.exe 29 PID 2544 wrote to memory of 2636 2544 taskeng.exe 29 PID 2544 wrote to memory of 2636 2544 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7e2ea70b932d0914c6dffebf580b7ef965d0c0305b95fafd57d71669375c71f.exe"C:\Users\Admin\AppData\Local\Temp\d7e2ea70b932d0914c6dffebf580b7ef965d0c0305b95fafd57d71669375c71f.exe"1⤵
- Drops file in Program Files directory
PID:2084
-
C:\Windows\system32\taskeng.exetaskeng.exe {CA71AE65-574A-4FEE-AC3C-62727FFC8721} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\PROGRA~3\Mozilla\ydvbdjf.exeC:\PROGRA~3\Mozilla\ydvbdjf.exe -smqpfhe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153KB
MD584482d6f5ae6a1d969c79e6735f2c8e8
SHA18f4a40213959ec826494f506fe8497eca9d11eec
SHA2562393ba21b93af10647969ba679bd887962c5deae68f11d76e3f24db242550db6
SHA512e796d24b2950619ee6e6ec462d5f706abe3f6d5aec00bcf0ac4b1818b8c67d70e5af2174db4ea0415689626d7d56332b4c9aac5d9edd9b517ddb1025ba62fccd