Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-03-2024 00:44
Static task
static1
Behavioral task
behavioral1
Sample
e1f41237f1d1c86715432ade9d7d80f963a77cc83383a5d68fadda0f246c5ecf.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e1f41237f1d1c86715432ade9d7d80f963a77cc83383a5d68fadda0f246c5ecf.exe
Resource
win10v2004-20240226-en
General
-
Target
e1f41237f1d1c86715432ade9d7d80f963a77cc83383a5d68fadda0f246c5ecf.exe
-
Size
390KB
-
MD5
52a06ad86bc5107b2dc82ddb19b114de
-
SHA1
a904f4063ec9b7d20073d05c0475140d5c77c5e9
-
SHA256
e1f41237f1d1c86715432ade9d7d80f963a77cc83383a5d68fadda0f246c5ecf
-
SHA512
4478ed04627500d073c353a5cd0545f9f2bfdff8e60722f2f74e9acff2f40b91ac8968248c83369a9eff32853e181a6e27450caa1d70e331a2e093bcd9984c83
-
SSDEEP
3072:NlYwDUWyFcB9fu+JMl2uU82Ws7f9sjboPACTQembG4hWp:NlfD1Yc7GIBgbzjbfLh2
Malware Config
Signatures
-
Detects executables built or packed with MPress PE compressor 3 IoCs
resource yara_rule behavioral1/memory/2456-0-0x0000000000400000-0x0000000000466000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x000b0000000155e2-7.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/2576-9-0x0000000000400000-0x0000000000466000-memory.dmp INDICATOR_EXE_Packed_MPress -
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2576 tbckyxk.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\tbckyxk.exe e1f41237f1d1c86715432ade9d7d80f963a77cc83383a5d68fadda0f246c5ecf.exe File created C:\PROGRA~3\Mozilla\newtrln.dll tbckyxk.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2576 2956 taskeng.exe 29 PID 2956 wrote to memory of 2576 2956 taskeng.exe 29 PID 2956 wrote to memory of 2576 2956 taskeng.exe 29 PID 2956 wrote to memory of 2576 2956 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1f41237f1d1c86715432ade9d7d80f963a77cc83383a5d68fadda0f246c5ecf.exe"C:\Users\Admin\AppData\Local\Temp\e1f41237f1d1c86715432ade9d7d80f963a77cc83383a5d68fadda0f246c5ecf.exe"1⤵
- Drops file in Program Files directory
PID:2456
-
C:\Windows\system32\taskeng.exetaskeng.exe {A8103DEB-FCB2-43C9-BF9F-9CA47C2156CB} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\PROGRA~3\Mozilla\tbckyxk.exeC:\PROGRA~3\Mozilla\tbckyxk.exe -gqpcbye2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
390KB
MD52d8ef52f5534e0f263e4175839e0277a
SHA152222114e16e854a946aa18b7bb84a45062e6f27
SHA2569f541da6f6f9be46582dfa04f90c4fb5a5d02b64db88e69e6646a2e6ec4d3715
SHA512e3da7abcebdef821968f66683e4380fed3763158e6033c4287286bc1466c69f80cdbbf13f76b0a87e48565381d06e4c94aa4a5a194572ba0c930cd3aa8d11a97