Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26-03-2024 18:11

General

  • Target

    20b4a7836ef3fb6d50dc468838d121fbaa1372b4627d5ecca4ab2e6e2300ce38.exe

  • Size

    235KB

  • MD5

    263f1451d06ff3005ee452357bc775f8

  • SHA1

    00f6dd1335fdf260a34d39d88871c1ad2edebbd1

  • SHA256

    20b4a7836ef3fb6d50dc468838d121fbaa1372b4627d5ecca4ab2e6e2300ce38

  • SHA512

    2ebfe594be10caf6072cfc126e9ac788c91eabc5e7d7f9246d970d2c6cb411242f558891b3cee88d69ac09f622db9ff30c93d3005234f16141ff238e8e55b59a

  • SSDEEP

    3072:aJOcumc7+5DHhH0qjuIWvJ2XVYxVJ/PWiud3uWHWABIippBIbLk5:cOCcq3BjunvJ2lYjJ/PWiuvBRppB0k5

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\20b4a7836ef3fb6d50dc468838d121fbaa1372b4627d5ecca4ab2e6e2300ce38.exe
    "C:\Users\Admin\AppData\Local\Temp\20b4a7836ef3fb6d50dc468838d121fbaa1372b4627d5ecca4ab2e6e2300ce38.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of UnmapMainImage
    PID:2084
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {83AAA85E-6AF6-41F1-A464-DE854FDA4EC7} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2592
    • C:\PROGRA~3\Mozilla\dbilzqh.exe
      C:\PROGRA~3\Mozilla\dbilzqh.exe -kwinamg
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of UnmapMainImage
      PID:2240

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~3\Mozilla\dbilzqh.exe

    Filesize

    235KB

    MD5

    65013499575d21d4b3b52d32fa29d09d

    SHA1

    f2a34be9c24ea0bbc5a7b69564a3839ffd9f6d88

    SHA256

    260a12165364ed5a4ccebae28a3dcb486cf89b8f95f51c4e23778507ebbaad66

    SHA512

    a1efc4f9a3e7a7f5d0fb0b23e5f856ca3f6b3792980ac190d18c75c8851c36c59cf1ec86c5676dda8d541b36f37fb882f1c80778d298b78c7bc3caf51f02ba24

  • memory/2084-0-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/2084-1-0x0000000000270000-0x00000000002CB000-memory.dmp

    Filesize

    364KB

  • memory/2084-2-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2084-4-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2240-7-0x0000000000460000-0x00000000004BB000-memory.dmp

    Filesize

    364KB

  • memory/2240-8-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2240-10-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB