Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
03-05-2024 01:24
Static task
static1
Behavioral task
behavioral1
Sample
9e3b2423e161dff6b197357b696fec6bcba0e201fc277fbdcc515e69c25f4658.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
9e3b2423e161dff6b197357b696fec6bcba0e201fc277fbdcc515e69c25f4658.exe
Resource
win10v2004-20240419-en
General
-
Target
9e3b2423e161dff6b197357b696fec6bcba0e201fc277fbdcc515e69c25f4658.exe
-
Size
252KB
-
MD5
376981bf32d6382397cfae32e729b341
-
SHA1
a45fd94bdd32a4b60f9f919f57f46282cbec06fe
-
SHA256
9e3b2423e161dff6b197357b696fec6bcba0e201fc277fbdcc515e69c25f4658
-
SHA512
1d959dc370a4a82e78f7138e7406288d7dcff95011881e31ec30a9f091ad80d2353afc86425b903d41b72dc307ef83a1ff0183eb1811abd11d024d8a3c83b175
-
SSDEEP
3072:uxGcwApj6FHzId1WmJ+UrdoI5iCCWm2x5wa3ny/7LsMaP8T1YvQd23:uxxpjAHzId1MUeI4CdRYa3ny/7mP823
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 1712 eccstpf.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\eccstpf.exe 9e3b2423e161dff6b197357b696fec6bcba0e201fc277fbdcc515e69c25f4658.exe File created C:\PROGRA~3\Mozilla\qtlrtjl.dll eccstpf.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2484 9e3b2423e161dff6b197357b696fec6bcba0e201fc277fbdcc515e69c25f4658.exe 1712 eccstpf.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1664 wrote to memory of 1712 1664 taskeng.exe 29 PID 1664 wrote to memory of 1712 1664 taskeng.exe 29 PID 1664 wrote to memory of 1712 1664 taskeng.exe 29 PID 1664 wrote to memory of 1712 1664 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e3b2423e161dff6b197357b696fec6bcba0e201fc277fbdcc515e69c25f4658.exe"C:\Users\Admin\AppData\Local\Temp\9e3b2423e161dff6b197357b696fec6bcba0e201fc277fbdcc515e69c25f4658.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2484
-
C:\Windows\system32\taskeng.exetaskeng.exe {FFB08C9A-1FF9-4709-956F-F3B62C11DC4D} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\PROGRA~3\Mozilla\eccstpf.exeC:\PROGRA~3\Mozilla\eccstpf.exe -ufgsyxd2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD5494a7411ff7fdbb312e4aaa2288e18c4
SHA1b766cead60dc5d729fe2a1052d0318c632c466a9
SHA25643bb22fe54921d41f5d4e62c1b4783d544bd8661625af2eb0ea6dda233de7096
SHA512f26d68a834387261ab5c4fc22782f854bf9eeb9590f0d397da720c2886c3ca407529aa9047d219d419a1fd7fc178bd566f029152b80ecf4980004fcc4ad9d620