Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-04-2024 22:44
Static task
static1
Behavioral task
behavioral1
Sample
79c78878bdd25f8318bfa7f89f653477cd0fcbfd302f5bf11b29b47871bc0a63.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
79c78878bdd25f8318bfa7f89f653477cd0fcbfd302f5bf11b29b47871bc0a63.exe
Resource
win10v2004-20231215-en
General
-
Target
79c78878bdd25f8318bfa7f89f653477cd0fcbfd302f5bf11b29b47871bc0a63.exe
-
Size
148KB
-
MD5
8aa0872076420c08de19c58dff6c03f9
-
SHA1
9ed9030fe4e9d0420d5cd7d0a4acb7db71cbfda9
-
SHA256
79c78878bdd25f8318bfa7f89f653477cd0fcbfd302f5bf11b29b47871bc0a63
-
SHA512
4b1ad5edc7b45951328f7297754fb37e03a2adbd34e143ef8836bd1d7d8807f13949f1e2c0713156647ff3aeb8de517f573331006610e4d2c20a8d5a5ccea78b
-
SSDEEP
3072:CDUp8yetaIBOvnMqllHQmkKtaY/JB/KMu0oS2rOaQn3OOXluZLq290LAP/0y+nMx:CDJVazMKV31FdaQvXluxqU+A/0y+nMI6
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2256 ujnwrxk.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\ujnwrxk.exe 79c78878bdd25f8318bfa7f89f653477cd0fcbfd302f5bf11b29b47871bc0a63.exe File created C:\PROGRA~3\Mozilla\klvnttl.dll ujnwrxk.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2256 2440 taskeng.exe 29 PID 2440 wrote to memory of 2256 2440 taskeng.exe 29 PID 2440 wrote to memory of 2256 2440 taskeng.exe 29 PID 2440 wrote to memory of 2256 2440 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\79c78878bdd25f8318bfa7f89f653477cd0fcbfd302f5bf11b29b47871bc0a63.exe"C:\Users\Admin\AppData\Local\Temp\79c78878bdd25f8318bfa7f89f653477cd0fcbfd302f5bf11b29b47871bc0a63.exe"1⤵
- Drops file in Program Files directory
PID:2312
-
C:\Windows\system32\taskeng.exetaskeng.exe {8C650D15-5BEE-4964-AD28-FCF54807A2AE} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\PROGRA~3\Mozilla\ujnwrxk.exeC:\PROGRA~3\Mozilla\ujnwrxk.exe -eagoxym2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2256
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD51ec990cdde44e5e9802811f9e082441d
SHA11022634cb18248083c7b19c16ec99a124ab0ea38
SHA256470ebf03e5fe653e953fd6dee099abd1fe8c7ee0227faad2ecb7ee553336300d
SHA51232ed5872831ea229c7bee86c8008f83b8e34523b5c89df624f59090113a1bd953f7a24a0694d0aa5545330eb0ad17017dd8156b5fce5e268a64f206bf73d15f1