Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240319-en
  • resource tags

    arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system
  • submitted
    27-03-2024 00:11

General

  • Target

    bfb6db1df972392eb8965569506b75df934c1520ee180b8cb7e196520433c433.exe

  • Size

    257KB

  • MD5

    de056650c55e607716958a66789b8617

  • SHA1

    4b3eb9270b086b20f6d87fc48ee58b1cf44ecd60

  • SHA256

    bfb6db1df972392eb8965569506b75df934c1520ee180b8cb7e196520433c433

  • SHA512

    1156b7eb58596fd4dfec60529299cdf5518a9bc3ea15cb211097d9b94f233c9a0533ae18cf8c4147b759d779077b8b935d7114e7aa3e2ae5b95e663cae506cf8

  • SSDEEP

    3072:e6yOaBa13l0TX70RaAWU22E9/EaR6Gye3BwOwfWx5ZIAKCbZ9xK/EFy+:G/YsT7m22E95R614BXYu57KCb3xKMw+

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bfb6db1df972392eb8965569506b75df934c1520ee180b8cb7e196520433c433.exe
    "C:\Users\Admin\AppData\Local\Temp\bfb6db1df972392eb8965569506b75df934c1520ee180b8cb7e196520433c433.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of UnmapMainImage
    PID:2184
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {669A677A-C1A8-4070-8EE8-EE18433CB5C9} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2924
    • C:\PROGRA~3\Mozilla\cwtsudd.exe
      C:\PROGRA~3\Mozilla\cwtsudd.exe -ldxtpdk
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of UnmapMainImage
      PID:2476

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~3\Mozilla\cwtsudd.exe

    Filesize

    257KB

    MD5

    a8e0a8257ed3ee03ea3150974893371f

    SHA1

    e40d24594346b1a10c96a587ad018c120e706dfb

    SHA256

    75fd8c43ff56571b60aa4243d1bc30f85ed8ef1aa75c2c7720ea468e83a44fcf

    SHA512

    f74e00ffae8e8328b1fb9dcd28b74482fbaf6a3e667f1dfcb35f5dc5c78dea9d649d8e243fabd752a0ae7fba2716160474ed6c8de9ad4fd30567edf8004edcc2

  • memory/2184-1-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2184-2-0x00000000002E0000-0x000000000033B000-memory.dmp

    Filesize

    364KB

  • memory/2184-0-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2184-4-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2476-7-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2476-8-0x0000000000460000-0x00000000004BB000-memory.dmp

    Filesize

    364KB

  • memory/2476-9-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2476-11-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB