Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
09-04-2024 02:32
Static task
static1
Behavioral task
behavioral1
Sample
cd4da35f3c8a5239a5d174ddb7ff1711229383ae44eb8629267a7c4aed6e80f4.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
cd4da35f3c8a5239a5d174ddb7ff1711229383ae44eb8629267a7c4aed6e80f4.exe
Resource
win10v2004-20240319-en
General
-
Target
cd4da35f3c8a5239a5d174ddb7ff1711229383ae44eb8629267a7c4aed6e80f4.exe
-
Size
276KB
-
MD5
28c6fbef2417d9e2cf58373001388e43
-
SHA1
98020a0e655d8596fe70c9f8b83b2f2adef88a7b
-
SHA256
cd4da35f3c8a5239a5d174ddb7ff1711229383ae44eb8629267a7c4aed6e80f4
-
SHA512
ece962ba6097607d8f76a20ba138550385bf7af1dc325dccb82125ece7e4f0a2a085976f091028d7cf4387b66a4511d891bc4b87b550e7ed3d2a82f27e00a9ea
-
SSDEEP
6144:yFpiTSfDhpOQAYg718kVFRCHplF6UoLGqpXwx:FTSfDh7AL18UwJbhWXwx
Malware Config
Signatures
-
Detects executables packed with ASPack 3 IoCs
resource yara_rule behavioral1/memory/2340-0-0x0000000000400000-0x0000000000469000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/files/0x000c000000015cd2-5.dat INDICATOR_EXE_Packed_ASPack behavioral1/memory/2476-7-0x0000000000400000-0x0000000000469000-memory.dmp INDICATOR_EXE_Packed_ASPack -
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2476 wrvdfyg.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\wrvdfyg.exe cd4da35f3c8a5239a5d174ddb7ff1711229383ae44eb8629267a7c4aed6e80f4.exe File created C:\PROGRA~3\Mozilla\klztrnd.dll wrvdfyg.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2340 cd4da35f3c8a5239a5d174ddb7ff1711229383ae44eb8629267a7c4aed6e80f4.exe 2476 wrvdfyg.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1788 wrote to memory of 2476 1788 taskeng.exe 30 PID 1788 wrote to memory of 2476 1788 taskeng.exe 30 PID 1788 wrote to memory of 2476 1788 taskeng.exe 30 PID 1788 wrote to memory of 2476 1788 taskeng.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd4da35f3c8a5239a5d174ddb7ff1711229383ae44eb8629267a7c4aed6e80f4.exe"C:\Users\Admin\AppData\Local\Temp\cd4da35f3c8a5239a5d174ddb7ff1711229383ae44eb8629267a7c4aed6e80f4.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2340
-
C:\Windows\system32\taskeng.exetaskeng.exe {B73C5307-F72E-41E2-B12A-B1D45D7A92FC} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\PROGRA~3\Mozilla\wrvdfyg.exeC:\PROGRA~3\Mozilla\wrvdfyg.exe -hzyjzia2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
276KB
MD533d3d701c4c4e846d93860bf1d22403e
SHA1528b739abe00763996c09b5c93f30c4548ffe6dc
SHA256bd53285a240d167deb3286deaff4e3788fc49f51faa7bc2db6f1672a8d7ba17f
SHA512b9a9173f3606f7fed7333f57850e6c8456d4f703ced533d3b19f03fb7f1a7d21d02b867c4668f9983d903857255151fbcf5802a056893cba599fb03751278299