Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/04/2024, 20:15
Static task
static1
Behavioral task
behavioral1
Sample
2c7a02a13443d55084c369827360aa0daf56fcb3327482d8bec04159f18aefaa.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2c7a02a13443d55084c369827360aa0daf56fcb3327482d8bec04159f18aefaa.exe
Resource
win10v2004-20240412-en
General
-
Target
2c7a02a13443d55084c369827360aa0daf56fcb3327482d8bec04159f18aefaa.exe
-
Size
185KB
-
MD5
a9b474e08170cdde3e25a49e982fbbaf
-
SHA1
19cba955d59116416d22a7110ef856d4b24eb535
-
SHA256
2c7a02a13443d55084c369827360aa0daf56fcb3327482d8bec04159f18aefaa
-
SHA512
62a3640e2c51689ee692c4726ff2f968ebe5b71779fbba0c60e5fe6800e6f3e18ae9cbd155d3aacc254ed07c89f1b3644e04c5f3105b40f3f18da9797e5e6d30
-
SSDEEP
3072:I3hLkFXg/dGAsg1wJkZYg2JSu3pp1Ft6aDiHlqzR++vjStzEP:eLkFwVGAsIwqZYgFuDDalYk+r2EP
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2552 dbilzqh.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\dbilzqh.exe 2c7a02a13443d55084c369827360aa0daf56fcb3327482d8bec04159f18aefaa.exe File created C:\PROGRA~3\Mozilla\zxoabnc.dll dbilzqh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2552 2108 taskeng.exe 29 PID 2108 wrote to memory of 2552 2108 taskeng.exe 29 PID 2108 wrote to memory of 2552 2108 taskeng.exe 29 PID 2108 wrote to memory of 2552 2108 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c7a02a13443d55084c369827360aa0daf56fcb3327482d8bec04159f18aefaa.exe"C:\Users\Admin\AppData\Local\Temp\2c7a02a13443d55084c369827360aa0daf56fcb3327482d8bec04159f18aefaa.exe"1⤵
- Drops file in Program Files directory
PID:2420
-
C:\Windows\system32\taskeng.exetaskeng.exe {3D37FF2D-CD89-42C1-859A-ABA6EAC04AEC} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\PROGRA~3\Mozilla\dbilzqh.exeC:\PROGRA~3\Mozilla\dbilzqh.exe -kwinamg2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
185KB
MD57911f5322a835d4b40c72e61d72e4576
SHA1063a33e0e850b94013d046a2b645845aec121740
SHA256e0fc9b1e124ee41623fe046ae5a517846b8b0c8dbc06e967f60d40aff717c0db
SHA5121cae8c7f806ca5744d436c4c8cb2044d6e9c644c50d6d2556430071aec9f634dec62ee805af585ef2737101e9bf2595b7dcfe521c1d8cc4bc012b1504b350b3f