Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-04-2024 22:34
Static task
static1
Behavioral task
behavioral1
Sample
4fe224c5f89a6c8af79cad37e64b0569.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4fe224c5f89a6c8af79cad37e64b0569.exe
Resource
win10v2004-20240226-en
General
-
Target
4fe224c5f89a6c8af79cad37e64b0569.exe
-
Size
287KB
-
MD5
4fe224c5f89a6c8af79cad37e64b0569
-
SHA1
7d175280212359df894b64f871313525840fab87
-
SHA256
cc4491b61a6f7fb63463401b464a925ca78470fc2bbd3182856dce1c4f8f3fed
-
SHA512
6e7a58abf18ca6e94d38740e6d5a5ec61c2608f0673918f1a176e3fcdfaedc00d1d498809f14f0b80bddbe23f0ccd81c9a6a6bc96a21bea06f7ac961ba109205
-
SSDEEP
6144:sOw14xM/grDmLuyau/CSOTag98aPRwI4A2SbGqJC:UnokuyJqhGaOA2SS
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2924 tbckyxk.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\tbckyxk.exe 4fe224c5f89a6c8af79cad37e64b0569.exe File created C:\PROGRA~3\Mozilla\newtrln.dll tbckyxk.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1336 4fe224c5f89a6c8af79cad37e64b0569.exe 2924 tbckyxk.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2924 2088 taskeng.exe 29 PID 2088 wrote to memory of 2924 2088 taskeng.exe 29 PID 2088 wrote to memory of 2924 2088 taskeng.exe 29 PID 2088 wrote to memory of 2924 2088 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fe224c5f89a6c8af79cad37e64b0569.exe"C:\Users\Admin\AppData\Local\Temp\4fe224c5f89a6c8af79cad37e64b0569.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1336
-
C:\Windows\system32\taskeng.exetaskeng.exe {EE2B83DA-3697-42F1-8062-793C50FE1C09} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\PROGRA~3\Mozilla\tbckyxk.exeC:\PROGRA~3\Mozilla\tbckyxk.exe -gqpcbye2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
287KB
MD53459a8fdfffc9f3ab5778a52e3e01085
SHA1a520c228c99e5b67beac8aaf01de952fc1fde6ac
SHA2565ba433585976b65e455820a5affe7557fab23779477cee27e5e7cda80ade5de1
SHA5125efbeb180a834ed22aaa211a59504a8398a1b07be5db0e0a94f1b2ca77a29cc004f35ce305bcae2239c3a2de23135cd2ee714b05e40abd5d55270e0ea9a7cc00