Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-03-2024 11:06
Static task
static1
Behavioral task
behavioral1
Sample
fbcdcb46ec96776bd3eb20edfaa2ec5379ea4e2c2454dafb947c369f89d551a7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fbcdcb46ec96776bd3eb20edfaa2ec5379ea4e2c2454dafb947c369f89d551a7.exe
Resource
win10v2004-20240226-en
General
-
Target
fbcdcb46ec96776bd3eb20edfaa2ec5379ea4e2c2454dafb947c369f89d551a7.exe
-
Size
138KB
-
MD5
ba32b16f4afdbe8fa146d2972fa7901f
-
SHA1
32ab987b891dd3a069754d51d7d6e278504d591b
-
SHA256
fbcdcb46ec96776bd3eb20edfaa2ec5379ea4e2c2454dafb947c369f89d551a7
-
SHA512
62b1d09b3fa803251e5eb0f1ac0845790bc8d9975e565449a35c34dd4cf7230666af690de80041cfb9dbe9be007d8c6b6a629e707481470e6e5a8c7fb6906c74
-
SSDEEP
3072:+m1/mS7+mI+N9khVJSXw9As+G8izV1beXdKBQzL2gM5VaM:hPLI6WVJSA9Af4zVkXI5xb
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2944 mgbxiii.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\mgbxiii.exe fbcdcb46ec96776bd3eb20edfaa2ec5379ea4e2c2454dafb947c369f89d551a7.exe File created C:\PROGRA~3\Mozilla\iudaoda.dll mgbxiii.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2944 2172 taskeng.exe 29 PID 2172 wrote to memory of 2944 2172 taskeng.exe 29 PID 2172 wrote to memory of 2944 2172 taskeng.exe 29 PID 2172 wrote to memory of 2944 2172 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbcdcb46ec96776bd3eb20edfaa2ec5379ea4e2c2454dafb947c369f89d551a7.exe"C:\Users\Admin\AppData\Local\Temp\fbcdcb46ec96776bd3eb20edfaa2ec5379ea4e2c2454dafb947c369f89d551a7.exe"1⤵
- Drops file in Program Files directory
PID:2164
-
C:\Windows\system32\taskeng.exetaskeng.exe {D65A73ED-4A57-4D88-8CC6-DC23421D9C61} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\PROGRA~3\Mozilla\mgbxiii.exeC:\PROGRA~3\Mozilla\mgbxiii.exe -ccvrhxi2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138KB
MD5d054e786d3efe7d2540811a5be18341b
SHA1baf7b8cd47b4df348dff9bb0b434ea36345ac8f3
SHA2560db7d81a47590fe2d339347a45f2ca3bff494edb745b27ca00264cbbbf590332
SHA5120b6d3dfdc6d5f7954d7e860fccdb3b5dbcda77d7b6fb7144c3ed54fbbcbda90ec20f0b120214f5c68526374ce30fecfa848b142635f33767d94888bfb283d06d