Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
01/05/2024, 03:51
Static task
static1
Behavioral task
behavioral1
Sample
d768cd2236094ee7a037eaac54bfabf826aae150a1c32996559ffbd208c2d236.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
d768cd2236094ee7a037eaac54bfabf826aae150a1c32996559ffbd208c2d236.exe
Resource
win10v2004-20240426-en
General
-
Target
d768cd2236094ee7a037eaac54bfabf826aae150a1c32996559ffbd208c2d236.exe
-
Size
173KB
-
MD5
2bbc574f709608ba1e7f01d05e0bb3c5
-
SHA1
ff84ec5d0c686d51393b66d99eb16d02c505f11b
-
SHA256
d768cd2236094ee7a037eaac54bfabf826aae150a1c32996559ffbd208c2d236
-
SHA512
5716889a9856b3d46f7840222440397ce019e9f9cb160fbd7c595276957caf55d683097712a36d9bab478fcd8730da77e6bc78c61da3ce6a4c2ec9ea4b3fb157
-
SSDEEP
3072:wDTQGUHkkPkIyh7+ECwsIgH0xpnFmaDJUGMu5pV8W6NwMiS50bNas4ej:CdUUi/wpgHyMu55of50omj
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 3044 eccstpf.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\eccstpf.exe d768cd2236094ee7a037eaac54bfabf826aae150a1c32996559ffbd208c2d236.exe File created C:\PROGRA~3\Mozilla\qtlrtjl.dll eccstpf.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3024 d768cd2236094ee7a037eaac54bfabf826aae150a1c32996559ffbd208c2d236.exe 3044 eccstpf.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1720 wrote to memory of 3044 1720 taskeng.exe 29 PID 1720 wrote to memory of 3044 1720 taskeng.exe 29 PID 1720 wrote to memory of 3044 1720 taskeng.exe 29 PID 1720 wrote to memory of 3044 1720 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d768cd2236094ee7a037eaac54bfabf826aae150a1c32996559ffbd208c2d236.exe"C:\Users\Admin\AppData\Local\Temp\d768cd2236094ee7a037eaac54bfabf826aae150a1c32996559ffbd208c2d236.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:3024
-
C:\Windows\system32\taskeng.exetaskeng.exe {43104A2F-AC58-4EAB-892D-9FD05139F821} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\PROGRA~3\Mozilla\eccstpf.exeC:\PROGRA~3\Mozilla\eccstpf.exe -ufgsyxd2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173KB
MD55abbdf59aea9a67b93bec2c2f1848fbf
SHA123e4bde549e8b6c9230b963bb1957cc08977a851
SHA256133f2840d3a7aa6505f7844e27c743eacae5fc5d1aa3ca9e164c27f820c72f12
SHA5124166c30ec398c61b013efffc2d9518549709beec2429f4ed2c893ad052bbcfc0baa0293f9eff07e77ff966b0b0dbe81d55f7d8be6ce09b45be8801c5f3b1516c