Analysis
-
max time kernel
122s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-04-2024 18:28
Static task
static1
Behavioral task
behavioral1
Sample
08a035a9b3a608cecd84b29eeae205174100acb58237036e727de33944b50e46.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
08a035a9b3a608cecd84b29eeae205174100acb58237036e727de33944b50e46.exe
Resource
win10v2004-20240226-en
General
-
Target
08a035a9b3a608cecd84b29eeae205174100acb58237036e727de33944b50e46.exe
-
Size
276KB
-
MD5
0cd6b4f27d0d9b6d3099545df3027dd8
-
SHA1
eff67c1959150380821edcd2f27660a60638fd7e
-
SHA256
08a035a9b3a608cecd84b29eeae205174100acb58237036e727de33944b50e46
-
SHA512
191df90d84e2c30e6a8af047cc3ff07de66b7403d2d9768cb33eea5e8bd290c6faa10bdea6a15b7ff5b355c85b7544a1bf55b92e8e0eb4d3e47a3f0f081ec370
-
SSDEEP
6144:yFpiTSfDhpOQAYg718kVFRCHplF6UoLGqpXK:FTSfDh7AL18UwJbhWXK
Malware Config
Signatures
-
Detects executables packed with ASPack 2 IoCs
resource yara_rule behavioral1/memory/2876-0-0x0000000000400000-0x0000000000469000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/files/0x0034000000015c8e-5.dat INDICATOR_EXE_Packed_ASPack -
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2572 nhadrjb.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\mrcfdgn.dll nhadrjb.exe File created C:\PROGRA~3\Mozilla\nhadrjb.exe 08a035a9b3a608cecd84b29eeae205174100acb58237036e727de33944b50e46.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2876 08a035a9b3a608cecd84b29eeae205174100acb58237036e727de33944b50e46.exe 2572 nhadrjb.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2624 wrote to memory of 2572 2624 taskeng.exe 28 PID 2624 wrote to memory of 2572 2624 taskeng.exe 28 PID 2624 wrote to memory of 2572 2624 taskeng.exe 28 PID 2624 wrote to memory of 2572 2624 taskeng.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\08a035a9b3a608cecd84b29eeae205174100acb58237036e727de33944b50e46.exe"C:\Users\Admin\AppData\Local\Temp\08a035a9b3a608cecd84b29eeae205174100acb58237036e727de33944b50e46.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2876
-
C:\Windows\system32\taskeng.exetaskeng.exe {BBF53970-2DB8-4A9B-B05C-AD019E93678C} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\PROGRA~3\Mozilla\nhadrjb.exeC:\PROGRA~3\Mozilla\nhadrjb.exe -giukxrm2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
276KB
MD5c255e35c005572284f08a7daf0748181
SHA10edc38f74bf41e5825d81644befe3579226dffca
SHA2561cbdda7b356ad65b9f08a3ea52b568f6c365153b442ad750f4e338d1660f588c
SHA512b33b401707a1d242a1c5fa137cfbff9effcfa57c159f70d1a29370a754aa81029ad2f3e12dcc5d288a20254e7ee7cc72ce8afe813eb0ef71e2f1197f50342beb