Analysis Overview
SHA256
6c9b79983a0b1da3003d43969e5fd004efd05a09a5f6b6e9ab83d1572c3c1a87
Threat Level: Known bad
The file 6c9b79983a0b1da3003d43969e5fd004efd05a09a5f6b6e9ab83d1572c3c1a87 was found to be: Known bad.
Malicious Activity Summary
UPX dump on OEP (original entry point)
UPX dump on OEP (original entry point)
Modifies AppInit DLL entries
UPX packed file
Executes dropped EXE
Drops file in Program Files directory
Unsigned PE
Program crash
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-04-06 22:05
Signatures
UPX dump on OEP (original entry point)
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-04-06 22:05
Reported
2024-04-06 22:07
Platform
win7-20240221-en
Max time kernel
119s
Max time network
123s
Command Line
Signatures
UPX dump on OEP (original entry point)
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Modifies AppInit DLL entries
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\PROGRA~3\Mozilla\tbckyxk.exe | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File created | C:\PROGRA~3\Mozilla\tbckyxk.exe | C:\Users\Admin\AppData\Local\Temp\6c9b79983a0b1da3003d43969e5fd004efd05a09a5f6b6e9ab83d1572c3c1a87.exe | N/A |
| File created | C:\PROGRA~3\Mozilla\newtrln.dll | C:\PROGRA~3\Mozilla\tbckyxk.exe | N/A |
Suspicious use of UnmapMainImage
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\6c9b79983a0b1da3003d43969e5fd004efd05a09a5f6b6e9ab83d1572c3c1a87.exe | N/A |
| N/A | N/A | C:\PROGRA~3\Mozilla\tbckyxk.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1072 wrote to memory of 2900 | N/A | C:\Windows\system32\taskeng.exe | C:\PROGRA~3\Mozilla\tbckyxk.exe |
| PID 1072 wrote to memory of 2900 | N/A | C:\Windows\system32\taskeng.exe | C:\PROGRA~3\Mozilla\tbckyxk.exe |
| PID 1072 wrote to memory of 2900 | N/A | C:\Windows\system32\taskeng.exe | C:\PROGRA~3\Mozilla\tbckyxk.exe |
| PID 1072 wrote to memory of 2900 | N/A | C:\Windows\system32\taskeng.exe | C:\PROGRA~3\Mozilla\tbckyxk.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\6c9b79983a0b1da3003d43969e5fd004efd05a09a5f6b6e9ab83d1572c3c1a87.exe
"C:\Users\Admin\AppData\Local\Temp\6c9b79983a0b1da3003d43969e5fd004efd05a09a5f6b6e9ab83d1572c3c1a87.exe"
C:\Windows\system32\taskeng.exe
taskeng.exe {C0809AE8-9C41-4144-A5D8-9BC7CB8FFBB5} S-1-5-18:NT AUTHORITY\System:Service:
C:\PROGRA~3\Mozilla\tbckyxk.exe
C:\PROGRA~3\Mozilla\tbckyxk.exe -gqpcbye
Network
Files
memory/2240-0-0x0000000000400000-0x000000000045E000-memory.dmp
memory/2240-1-0x0000000000260000-0x00000000002BB000-memory.dmp
memory/2240-2-0x0000000000400000-0x000000000045B000-memory.dmp
memory/2240-4-0x0000000000400000-0x000000000045B000-memory.dmp
memory/2240-5-0x0000000000260000-0x00000000002BB000-memory.dmp
C:\PROGRA~3\Mozilla\tbckyxk.exe
| MD5 | 1a80d8e71d605667861b7426d7b0c870 |
| SHA1 | b5cbcd6c78efa62034c6ea1741ff41bd76f379ad |
| SHA256 | 521446db27ab2273c05e22409df77cc3b73f2cb96c62f910d9b04f40655bde5d |
| SHA512 | 6587af02d2ca8edc7adcc9845ec26bbc30bd9e3df5cebf47e2201129e33f7286aee99248f09c067b37b44ad9ef7b227b76b566e89e3655be0ed55ed9c4157382 |
memory/2900-8-0x0000000000400000-0x000000000045E000-memory.dmp
memory/2900-9-0x0000000000460000-0x00000000004BB000-memory.dmp
memory/2900-10-0x0000000000400000-0x000000000045B000-memory.dmp
memory/2900-12-0x0000000000400000-0x000000000045B000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-04-06 22:05
Reported
2024-04-06 22:08
Platform
win10v2004-20240226-en
Max time kernel
114s
Max time network
163s
Command Line
Signatures
UPX dump on OEP (original entry point)
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\6c9b79983a0b1da3003d43969e5fd004efd05a09a5f6b6e9ab83d1572c3c1a87.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\6c9b79983a0b1da3003d43969e5fd004efd05a09a5f6b6e9ab83d1572c3c1a87.exe
"C:\Users\Admin\AppData\Local\Temp\6c9b79983a0b1da3003d43969e5fd004efd05a09a5f6b6e9ab83d1572c3c1a87.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1080 -ip 1080
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1080 -s 448
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2984 --field-trial-handle=2276,i,1205556100727695622,5044463180471657307,262144 --variations-seed-version /prefetch:8
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 17.83.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.150.49.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 14.160.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.86.106.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 50.23.12.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 13.107.253.64:443 | tcp | |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
Files
memory/1080-0-0x0000000000400000-0x000000000045E000-memory.dmp
memory/1080-1-0x0000000000610000-0x000000000066B000-memory.dmp
memory/1080-2-0x0000000000400000-0x000000000045E000-memory.dmp
memory/1080-3-0x0000000000610000-0x000000000066B000-memory.dmp