Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15-04-2024 04:03

General

  • Target

    e6b4a7a8dc574b8ad209819831cfb862ed7d212693a4f56ff88fd5b01b532899.exe

  • Size

    184KB

  • MD5

    037ecfb38ad3afabd4d27963225400b0

  • SHA1

    3fe0ee4f698e255a28d2039cdb787799e2707a1b

  • SHA256

    e6b4a7a8dc574b8ad209819831cfb862ed7d212693a4f56ff88fd5b01b532899

  • SHA512

    9a8aed19e28c4f0a15fb3236f14a7c7d030a5ef8145f0fb598ec07a97c38f6c6d840e919ae2e7d23c27c767eefef102f3620630a98c45c8724623d7a1467fb97

  • SSDEEP

    3072:SbFZBpiJrsZnWbPOq1BxsoHqiT58JlrUSEJH/86DVJAknokaQp:SbF3pSw85DxsoKrlrPE3T1aU

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e6b4a7a8dc574b8ad209819831cfb862ed7d212693a4f56ff88fd5b01b532899.exe
    "C:\Users\Admin\AppData\Local\Temp\e6b4a7a8dc574b8ad209819831cfb862ed7d212693a4f56ff88fd5b01b532899.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of UnmapMainImage
    PID:2932
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {515068FE-396F-447A-96AC-2B973298463D} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2540
    • C:\PROGRA~3\Mozilla\dbilzqh.exe
      C:\PROGRA~3\Mozilla\dbilzqh.exe -kwinamg
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of UnmapMainImage
      PID:2852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~3\Mozilla\dbilzqh.exe

    Filesize

    184KB

    MD5

    ff148f6e8d2fd5146e15b0e3f44d911e

    SHA1

    7f6f110ebfe3e8452bbd3ed1a7327b141dc895d3

    SHA256

    d76db3ad72320c90792a74f5f10affca349f62549e0889a16b751ff26005f614

    SHA512

    08b1834a4cc8e569bfeee512aad434590564a40bfcf6b99151a2611faabfa20a55a2857d89bb16bed1fa33106b32668368eeb3b0d6d4ddce32116e1ced457918

  • memory/2852-7-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2852-8-0x0000000000310000-0x000000000036B000-memory.dmp

    Filesize

    364KB

  • memory/2852-9-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2852-11-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2932-2-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2932-1-0x00000000002F0000-0x000000000034B000-memory.dmp

    Filesize

    364KB

  • memory/2932-0-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2932-4-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB