Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
25-04-2024 03:25
Static task
static1
Behavioral task
behavioral1
Sample
cc2d91ee2b6aaebcf6d045c298433ac845e7b0e5df11a5faf4f85f47f1a554fe.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
cc2d91ee2b6aaebcf6d045c298433ac845e7b0e5df11a5faf4f85f47f1a554fe.exe
Resource
win10v2004-20240226-en
General
-
Target
cc2d91ee2b6aaebcf6d045c298433ac845e7b0e5df11a5faf4f85f47f1a554fe.exe
-
Size
365KB
-
MD5
16a179dca4c208386da94f9688f141f5
-
SHA1
6ce39a1afd49593e85141d30b6bcb1808111bdd5
-
SHA256
cc2d91ee2b6aaebcf6d045c298433ac845e7b0e5df11a5faf4f85f47f1a554fe
-
SHA512
391bc3854dd61d5778abf6b323157d58a2d3cd767d3d7d4f8d32fe370b02d07fbb2d728643163c877058aa7d90b20c0a04d4e70ea86a1f8b8b5ac0944fb2870c
-
SSDEEP
3072:ndgTsDAJJRjO2wDEpiLKHuv0FG00/JpR0arsgMHY7H3ey+:nyJJ0wpiWS3+/gnH3t+
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2784 racmzae.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\racmzae.exe cc2d91ee2b6aaebcf6d045c298433ac845e7b0e5df11a5faf4f85f47f1a554fe.exe File created C:\PROGRA~3\Mozilla\ttbtowf.dll racmzae.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2328 cc2d91ee2b6aaebcf6d045c298433ac845e7b0e5df11a5faf4f85f47f1a554fe.exe 2784 racmzae.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1032 wrote to memory of 2784 1032 taskeng.exe 29 PID 1032 wrote to memory of 2784 1032 taskeng.exe 29 PID 1032 wrote to memory of 2784 1032 taskeng.exe 29 PID 1032 wrote to memory of 2784 1032 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc2d91ee2b6aaebcf6d045c298433ac845e7b0e5df11a5faf4f85f47f1a554fe.exe"C:\Users\Admin\AppData\Local\Temp\cc2d91ee2b6aaebcf6d045c298433ac845e7b0e5df11a5faf4f85f47f1a554fe.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2328
-
C:\Windows\system32\taskeng.exetaskeng.exe {75784E6D-0BC6-4C8E-83D7-CA4130757840} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\PROGRA~3\Mozilla\racmzae.exeC:\PROGRA~3\Mozilla\racmzae.exe -cddhnyc2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
365KB
MD5028be2a1138528e74a59ea8ff7218144
SHA1c1fbfa51d71a41fae60f6ca39c2e17fe61d22c27
SHA256ad1caa73b6b4dec853c29fe806104c6862906e20e0b38f01f833cb1a2b30910a
SHA512101cebae6ca427ec59b8cbc00bc0bd44e0bc53248683623d583661733b932d4c3632d78892f1322149ef7017280a6ed48f1189ef44c4d37d09c189b4849f3cd7