Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-04-2024 20:24
Behavioral task
behavioral1
Sample
33ea49910b198bc405ebd1f9f8acf2860e0a14ffd4678ea83c54159fe1d7c591.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
33ea49910b198bc405ebd1f9f8acf2860e0a14ffd4678ea83c54159fe1d7c591.exe
Resource
win10v2004-20240226-en
General
-
Target
33ea49910b198bc405ebd1f9f8acf2860e0a14ffd4678ea83c54159fe1d7c591.exe
-
Size
426KB
-
MD5
a9692b98efd1d94fa3b0b9afef4703e4
-
SHA1
662aa0c98498034bcebf8c52657160b38909fc87
-
SHA256
33ea49910b198bc405ebd1f9f8acf2860e0a14ffd4678ea83c54159fe1d7c591
-
SHA512
e3ce7b732610d5a403efdeceb4b21ea84a748a70ffe0d6dcae503061f11e92f3f1fc7b00e6aceb0c33f3934fe6743ba02d859afe19bc7516b4c14772928718d4
-
SSDEEP
6144:F48bmcXXXXXXXXXAXX7h6Ylo8Tvp3nbZPbjq92AXjIIHXjOWJPZ7Vn8:O8BXXXXXXXXXAXX7hx6UhqXH9Z18
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 3 IoCs
resource yara_rule behavioral1/memory/1784-0-0x0000000000400000-0x000000000045F000-memory.dmp UPX behavioral1/files/0x000c000000015a2d-5.dat UPX behavioral1/memory/2508-7-0x0000000000400000-0x000000000045F000-memory.dmp UPX -
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2508 tbckyxk.exe -
resource yara_rule behavioral1/memory/1784-0-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/files/0x000c000000015a2d-5.dat upx behavioral1/memory/2508-7-0x0000000000400000-0x000000000045F000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\tbckyxk.exe 33ea49910b198bc405ebd1f9f8acf2860e0a14ffd4678ea83c54159fe1d7c591.exe File created C:\PROGRA~3\Mozilla\newtrln.dll tbckyxk.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1784 33ea49910b198bc405ebd1f9f8acf2860e0a14ffd4678ea83c54159fe1d7c591.exe 2508 tbckyxk.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2580 wrote to memory of 2508 2580 taskeng.exe 29 PID 2580 wrote to memory of 2508 2580 taskeng.exe 29 PID 2580 wrote to memory of 2508 2580 taskeng.exe 29 PID 2580 wrote to memory of 2508 2580 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\33ea49910b198bc405ebd1f9f8acf2860e0a14ffd4678ea83c54159fe1d7c591.exe"C:\Users\Admin\AppData\Local\Temp\33ea49910b198bc405ebd1f9f8acf2860e0a14ffd4678ea83c54159fe1d7c591.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1784
-
C:\Windows\system32\taskeng.exetaskeng.exe {B0C74251-6EF6-417A-B563-93E26C829358} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\PROGRA~3\Mozilla\tbckyxk.exeC:\PROGRA~3\Mozilla\tbckyxk.exe -gqpcbye2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
426KB
MD50bd5b6c0031215d18c0bd2d1bd4ff1e0
SHA190fe02915c4a08024c3ddb2faf46cdb34ad68ac6
SHA2560f3b71115f0d93a48a50154d7308c31381cb6a8fb7f65908937aea65d1b4b00e
SHA512edba5cb244b90a3dc4e6485460bb25a945134c92f34698f9f167b6a1f60765e0e541d3ec682df23513b8203f93562a6db152c8089b5aeb57bc215e8f6ec9517a