Analysis
-
max time kernel
92s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-04-2024 21:27
Static task
static1
Behavioral task
behavioral1
Sample
1288b8afa26064eab7b3258a18d02187.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
1288b8afa26064eab7b3258a18d02187.exe
Resource
win10v2004-20240226-en
General
-
Target
1288b8afa26064eab7b3258a18d02187.exe
-
Size
162KB
-
MD5
1288b8afa26064eab7b3258a18d02187
-
SHA1
49055d1fc4c76be463a622975de525bc9887afad
-
SHA256
bf9cb976bb568b8835fc85a18791cd06319d00eb94e598f91442e692056a5668
-
SHA512
3c658e919eaef0b1fee7560f989b491ab3a9b9219daffdd1b2f84bf12e330a26a03a04ad9fae1b93a36de2261169fa8ced4326fb97ff53ed0f6f9453cdaae740
-
SSDEEP
3072:2yNOu3ap01kqMTue7+AVETnb6Km9gFTFTHugCoReiVWeJfefVUxN:1Kp+kqKt7DV4bzm2FTFbIyVWeU2xN
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 1012 hdxpvzc.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\hdxpvzc.exe 1288b8afa26064eab7b3258a18d02187.exe File created C:\PROGRA~3\Mozilla\ydmvyrg.dll hdxpvzc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1288b8afa26064eab7b3258a18d02187.exe"C:\Users\Admin\AppData\Local\Temp\1288b8afa26064eab7b3258a18d02187.exe"1⤵
- Drops file in Program Files directory
PID:1108
-
C:\PROGRA~3\Mozilla\hdxpvzc.exeC:\PROGRA~3\Mozilla\hdxpvzc.exe -ilrweca1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
162KB
MD5585e6d2b5ff2241cd4dda431daca51da
SHA19999d0ada71601c6755134d1aa2f331378cd9426
SHA256f4346e92d67076353ce6ea8b96fc26829d7f33b55219bd6b57d68f076850effc
SHA51258f673ae3b87deb58e98d6c3214d8fae52168d8d653ca8d78f1f2ad5707561b2bc0b556ef47347de9e1c2261fc33a2313718292d5607e422491bfbde2c62340f