Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
27-03-2024 00:11
Static task
static1
Behavioral task
behavioral1
Sample
bfb6db1df972392eb8965569506b75df934c1520ee180b8cb7e196520433c433.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
bfb6db1df972392eb8965569506b75df934c1520ee180b8cb7e196520433c433.exe
Resource
win10v2004-20240226-en
General
-
Target
bfb6db1df972392eb8965569506b75df934c1520ee180b8cb7e196520433c433.exe
-
Size
257KB
-
MD5
de056650c55e607716958a66789b8617
-
SHA1
4b3eb9270b086b20f6d87fc48ee58b1cf44ecd60
-
SHA256
bfb6db1df972392eb8965569506b75df934c1520ee180b8cb7e196520433c433
-
SHA512
1156b7eb58596fd4dfec60529299cdf5518a9bc3ea15cb211097d9b94f233c9a0533ae18cf8c4147b759d779077b8b935d7114e7aa3e2ae5b95e663cae506cf8
-
SSDEEP
3072:e6yOaBa13l0TX70RaAWU22E9/EaR6Gye3BwOwfWx5ZIAKCbZ9xK/EFy+:G/YsT7m22E95R614BXYu57KCb3xKMw+
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2476 cwtsudd.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\njrippn.dll cwtsudd.exe File created C:\PROGRA~3\Mozilla\cwtsudd.exe bfb6db1df972392eb8965569506b75df934c1520ee180b8cb7e196520433c433.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2184 bfb6db1df972392eb8965569506b75df934c1520ee180b8cb7e196520433c433.exe 2476 cwtsudd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2476 2924 taskeng.exe 29 PID 2924 wrote to memory of 2476 2924 taskeng.exe 29 PID 2924 wrote to memory of 2476 2924 taskeng.exe 29 PID 2924 wrote to memory of 2476 2924 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfb6db1df972392eb8965569506b75df934c1520ee180b8cb7e196520433c433.exe"C:\Users\Admin\AppData\Local\Temp\bfb6db1df972392eb8965569506b75df934c1520ee180b8cb7e196520433c433.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2184
-
C:\Windows\system32\taskeng.exetaskeng.exe {669A677A-C1A8-4070-8EE8-EE18433CB5C9} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\PROGRA~3\Mozilla\cwtsudd.exeC:\PROGRA~3\Mozilla\cwtsudd.exe -ldxtpdk2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257KB
MD5a8e0a8257ed3ee03ea3150974893371f
SHA1e40d24594346b1a10c96a587ad018c120e706dfb
SHA25675fd8c43ff56571b60aa4243d1bc30f85ed8ef1aa75c2c7720ea468e83a44fcf
SHA512f74e00ffae8e8328b1fb9dcd28b74482fbaf6a3e667f1dfcb35f5dc5c78dea9d649d8e243fabd752a0ae7fba2716160474ed6c8de9ad4fd30567edf8004edcc2