Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-04-2024 03:18
Static task
static1
Behavioral task
behavioral1
Sample
d627c04cb5a7bc0f94424a48f1a8b662dbf8532f6f5b38e712fac83222886df3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d627c04cb5a7bc0f94424a48f1a8b662dbf8532f6f5b38e712fac83222886df3.exe
Resource
win10v2004-20240226-en
General
-
Target
d627c04cb5a7bc0f94424a48f1a8b662dbf8532f6f5b38e712fac83222886df3.exe
-
Size
155KB
-
MD5
405e7f735313b475a95b15ce968ce190
-
SHA1
cc346ae889a3b1d0659b0964f215411fc37a3263
-
SHA256
d627c04cb5a7bc0f94424a48f1a8b662dbf8532f6f5b38e712fac83222886df3
-
SHA512
e14396b4830c5229110daddac9a2eecb9e99ca1688ab815415c45ea1aac7903703359be57501ad94c6d55a4bf7b819735cee7769216dd383d9e495604ba1ea6e
-
SSDEEP
3072:ltQoAIRBiqAoZz6ix08+yQLaldH6AkR3ivgipBI0Sp0zt:/yIRBixoZOiuyOQdHeR3ivgip9S+B
Malware Config
Signatures
-
Detects executables built or packed with MPress PE compressor 4 IoCs
resource yara_rule behavioral2/memory/2032-0-0x0000000000400000-0x000000000042A000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/2032-9-0x0000000000400000-0x000000000042A000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x000b00000002312c-8.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/460-16-0x0000000000400000-0x000000000042A000-memory.dmp INDICATOR_EXE_Packed_MPress -
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 460 hdxpvzc.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\hdxpvzc.exe d627c04cb5a7bc0f94424a48f1a8b662dbf8532f6f5b38e712fac83222886df3.exe File created C:\PROGRA~3\Mozilla\ydmvyrg.dll hdxpvzc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d627c04cb5a7bc0f94424a48f1a8b662dbf8532f6f5b38e712fac83222886df3.exe"C:\Users\Admin\AppData\Local\Temp\d627c04cb5a7bc0f94424a48f1a8b662dbf8532f6f5b38e712fac83222886df3.exe"1⤵
- Drops file in Program Files directory
PID:2032
-
C:\PROGRA~3\Mozilla\hdxpvzc.exeC:\PROGRA~3\Mozilla\hdxpvzc.exe -ilrweca1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
155KB
MD54080ecc5ede79ad7c849b5d1e4f18d6b
SHA1e2f8d18c7aee866c3db19bb6171f2031ed6073a1
SHA2565d685f99c83e618ce932d2e184c77493763a0b497d99702c6770ce0129bb35a9
SHA512fa00c373ed3dbb51ee5dae4bcbb52a74336185d7893c30101a11fe79f48198c308ed64bae72fc3d18dd953df7d35e344b9943d3d5dfaab0ae5ec4fe9b2c6086f