Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-03-2024 18:11
Static task
static1
Behavioral task
behavioral1
Sample
20b4a7836ef3fb6d50dc468838d121fbaa1372b4627d5ecca4ab2e6e2300ce38.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
20b4a7836ef3fb6d50dc468838d121fbaa1372b4627d5ecca4ab2e6e2300ce38.exe
Resource
win10v2004-20240226-en
General
-
Target
20b4a7836ef3fb6d50dc468838d121fbaa1372b4627d5ecca4ab2e6e2300ce38.exe
-
Size
235KB
-
MD5
263f1451d06ff3005ee452357bc775f8
-
SHA1
00f6dd1335fdf260a34d39d88871c1ad2edebbd1
-
SHA256
20b4a7836ef3fb6d50dc468838d121fbaa1372b4627d5ecca4ab2e6e2300ce38
-
SHA512
2ebfe594be10caf6072cfc126e9ac788c91eabc5e7d7f9246d970d2c6cb411242f558891b3cee88d69ac09f622db9ff30c93d3005234f16141ff238e8e55b59a
-
SSDEEP
3072:aJOcumc7+5DHhH0qjuIWvJ2XVYxVJ/PWiud3uWHWABIippBIbLk5:cOCcq3BjunvJ2lYjJ/PWiuvBRppB0k5
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2240 dbilzqh.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\dbilzqh.exe 20b4a7836ef3fb6d50dc468838d121fbaa1372b4627d5ecca4ab2e6e2300ce38.exe File created C:\PROGRA~3\Mozilla\zxoabnc.dll dbilzqh.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2084 20b4a7836ef3fb6d50dc468838d121fbaa1372b4627d5ecca4ab2e6e2300ce38.exe 2240 dbilzqh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2592 wrote to memory of 2240 2592 taskeng.exe 29 PID 2592 wrote to memory of 2240 2592 taskeng.exe 29 PID 2592 wrote to memory of 2240 2592 taskeng.exe 29 PID 2592 wrote to memory of 2240 2592 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\20b4a7836ef3fb6d50dc468838d121fbaa1372b4627d5ecca4ab2e6e2300ce38.exe"C:\Users\Admin\AppData\Local\Temp\20b4a7836ef3fb6d50dc468838d121fbaa1372b4627d5ecca4ab2e6e2300ce38.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2084
-
C:\Windows\system32\taskeng.exetaskeng.exe {83AAA85E-6AF6-41F1-A464-DE854FDA4EC7} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\PROGRA~3\Mozilla\dbilzqh.exeC:\PROGRA~3\Mozilla\dbilzqh.exe -kwinamg2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
235KB
MD565013499575d21d4b3b52d32fa29d09d
SHA1f2a34be9c24ea0bbc5a7b69564a3839ffd9f6d88
SHA256260a12165364ed5a4ccebae28a3dcb486cf89b8f95f51c4e23778507ebbaad66
SHA512a1efc4f9a3e7a7f5d0fb0b23e5f856ca3f6b3792980ac190d18c75c8851c36c59cf1ec86c5676dda8d541b36f37fb882f1c80778d298b78c7bc3caf51f02ba24