Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22/04/2024, 20:15

General

  • Target

    2c7a02a13443d55084c369827360aa0daf56fcb3327482d8bec04159f18aefaa.exe

  • Size

    185KB

  • MD5

    a9b474e08170cdde3e25a49e982fbbaf

  • SHA1

    19cba955d59116416d22a7110ef856d4b24eb535

  • SHA256

    2c7a02a13443d55084c369827360aa0daf56fcb3327482d8bec04159f18aefaa

  • SHA512

    62a3640e2c51689ee692c4726ff2f968ebe5b71779fbba0c60e5fe6800e6f3e18ae9cbd155d3aacc254ed07c89f1b3644e04c5f3105b40f3f18da9797e5e6d30

  • SSDEEP

    3072:I3hLkFXg/dGAsg1wJkZYg2JSu3pp1Ft6aDiHlqzR++vjStzEP:eLkFwVGAsIwqZYgFuDDalYk+r2EP

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c7a02a13443d55084c369827360aa0daf56fcb3327482d8bec04159f18aefaa.exe
    "C:\Users\Admin\AppData\Local\Temp\2c7a02a13443d55084c369827360aa0daf56fcb3327482d8bec04159f18aefaa.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2420
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {3D37FF2D-CD89-42C1-859A-ABA6EAC04AEC} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\PROGRA~3\Mozilla\dbilzqh.exe
      C:\PROGRA~3\Mozilla\dbilzqh.exe -kwinamg
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:2552

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~3\Mozilla\dbilzqh.exe

    Filesize

    185KB

    MD5

    7911f5322a835d4b40c72e61d72e4576

    SHA1

    063a33e0e850b94013d046a2b645845aec121740

    SHA256

    e0fc9b1e124ee41623fe046ae5a517846b8b0c8dbc06e967f60d40aff717c0db

    SHA512

    1cae8c7f806ca5744d436c4c8cb2044d6e9c644c50d6d2556430071aec9f634dec62ee805af585ef2737101e9bf2595b7dcfe521c1d8cc4bc012b1504b350b3f

  • memory/2420-0-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2420-1-0x0000000000320000-0x000000000037B000-memory.dmp

    Filesize

    364KB

  • memory/2552-10-0x0000000000300000-0x000000000035B000-memory.dmp

    Filesize

    364KB