Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-04-2024 04:03
Static task
static1
Behavioral task
behavioral1
Sample
e6b4a7a8dc574b8ad209819831cfb862ed7d212693a4f56ff88fd5b01b532899.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e6b4a7a8dc574b8ad209819831cfb862ed7d212693a4f56ff88fd5b01b532899.exe
Resource
win10v2004-20240412-en
General
-
Target
e6b4a7a8dc574b8ad209819831cfb862ed7d212693a4f56ff88fd5b01b532899.exe
-
Size
184KB
-
MD5
037ecfb38ad3afabd4d27963225400b0
-
SHA1
3fe0ee4f698e255a28d2039cdb787799e2707a1b
-
SHA256
e6b4a7a8dc574b8ad209819831cfb862ed7d212693a4f56ff88fd5b01b532899
-
SHA512
9a8aed19e28c4f0a15fb3236f14a7c7d030a5ef8145f0fb598ec07a97c38f6c6d840e919ae2e7d23c27c767eefef102f3620630a98c45c8724623d7a1467fb97
-
SSDEEP
3072:SbFZBpiJrsZnWbPOq1BxsoHqiT58JlrUSEJH/86DVJAknokaQp:SbF3pSw85DxsoKrlrPE3T1aU
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2852 dbilzqh.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\dbilzqh.exe e6b4a7a8dc574b8ad209819831cfb862ed7d212693a4f56ff88fd5b01b532899.exe File created C:\PROGRA~3\Mozilla\zxoabnc.dll dbilzqh.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2932 e6b4a7a8dc574b8ad209819831cfb862ed7d212693a4f56ff88fd5b01b532899.exe 2852 dbilzqh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2852 2540 taskeng.exe 29 PID 2540 wrote to memory of 2852 2540 taskeng.exe 29 PID 2540 wrote to memory of 2852 2540 taskeng.exe 29 PID 2540 wrote to memory of 2852 2540 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6b4a7a8dc574b8ad209819831cfb862ed7d212693a4f56ff88fd5b01b532899.exe"C:\Users\Admin\AppData\Local\Temp\e6b4a7a8dc574b8ad209819831cfb862ed7d212693a4f56ff88fd5b01b532899.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2932
-
C:\Windows\system32\taskeng.exetaskeng.exe {515068FE-396F-447A-96AC-2B973298463D} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\PROGRA~3\Mozilla\dbilzqh.exeC:\PROGRA~3\Mozilla\dbilzqh.exe -kwinamg2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD5ff148f6e8d2fd5146e15b0e3f44d911e
SHA17f6f110ebfe3e8452bbd3ed1a7327b141dc895d3
SHA256d76db3ad72320c90792a74f5f10affca349f62549e0889a16b751ff26005f614
SHA51208b1834a4cc8e569bfeee512aad434590564a40bfcf6b99151a2611faabfa20a55a2857d89bb16bed1fa33106b32668368eeb3b0d6d4ddce32116e1ced457918