Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/04/2024, 00:09
Static task
static1
Behavioral task
behavioral1
Sample
8ebfbc62b624487a823b5a094a6aec7d1f300c278eb6d2260c441020257e912f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8ebfbc62b624487a823b5a094a6aec7d1f300c278eb6d2260c441020257e912f.exe
Resource
win10v2004-20240226-en
General
-
Target
8ebfbc62b624487a823b5a094a6aec7d1f300c278eb6d2260c441020257e912f.exe
-
Size
299KB
-
MD5
6ff47a93249551f5b4bf2207900366de
-
SHA1
205f290e41b6daa9ab21a9a8772bd83d58feaa8a
-
SHA256
8ebfbc62b624487a823b5a094a6aec7d1f300c278eb6d2260c441020257e912f
-
SHA512
499aec7d357ca80b06f8d9a021ea9d223d54fc978039da7a4b7f0995ed7906f1a2aadef9a0c13559107fb8944ee4e57e8311139318d21ab0d7e252f79b0f40da
-
SSDEEP
6144:xbF3pSw85DxsoKrlrPE3TtaoybMSeLng4TI:xB3/YxsoKrlriTpSeLndTI
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2944 tbckyxk.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\tbckyxk.exe 8ebfbc62b624487a823b5a094a6aec7d1f300c278eb6d2260c441020257e912f.exe File created C:\PROGRA~3\Mozilla\newtrln.dll tbckyxk.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2068 8ebfbc62b624487a823b5a094a6aec7d1f300c278eb6d2260c441020257e912f.exe 2944 tbckyxk.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2596 wrote to memory of 2944 2596 taskeng.exe 29 PID 2596 wrote to memory of 2944 2596 taskeng.exe 29 PID 2596 wrote to memory of 2944 2596 taskeng.exe 29 PID 2596 wrote to memory of 2944 2596 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ebfbc62b624487a823b5a094a6aec7d1f300c278eb6d2260c441020257e912f.exe"C:\Users\Admin\AppData\Local\Temp\8ebfbc62b624487a823b5a094a6aec7d1f300c278eb6d2260c441020257e912f.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2068
-
C:\Windows\system32\taskeng.exetaskeng.exe {D04852F5-92CE-4E13-BC3A-1C63E19CAD1F} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\PROGRA~3\Mozilla\tbckyxk.exeC:\PROGRA~3\Mozilla\tbckyxk.exe -gqpcbye2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
299KB
MD5386fdcb0a538fc1f18c6c38c65dd6227
SHA18e21cd2919fe1eedc9d28770bec8c14c453b2d69
SHA256e70e4e7db390279e7faed600829d74c73abb7804bd1c98de78a572e04756a3a0
SHA51246e050a9d344f717d157ac902c6d2c3af704fc243358648d26a52b6af888b9046651c273be7828acaab7db022293fce6f586f2fb4fe8bc8737650372cea91645