Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 21:52

General

  • Target

    5754f2d8fdc19569e43d2831f18944eab227cf06488bbbdd06f35c8384077b4d.exe

  • Size

    210KB

  • MD5

    436e61a47c0bf6516e9f4d9586541d79

  • SHA1

    5edd9dfa058d0d3d75615289d8ff61a5e22975a3

  • SHA256

    5754f2d8fdc19569e43d2831f18944eab227cf06488bbbdd06f35c8384077b4d

  • SHA512

    d35e228e5f0c7ddaa4d02b6d228b4ba340946f0cb90b055b2b0052eefed1bdd5ec41e5d8211526b78f1196bcfdc845e9b52a8f8c38c7bdbdc557b268933e9aa5

  • SSDEEP

    6144:H0Ys9g6Bbsp3wXSy7hEjN2Vjthzm/c2SbGqJt:HJsK60gXSjAVjS7Sd

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5754f2d8fdc19569e43d2831f18944eab227cf06488bbbdd06f35c8384077b4d.exe
    "C:\Users\Admin\AppData\Local\Temp\5754f2d8fdc19569e43d2831f18944eab227cf06488bbbdd06f35c8384077b4d.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of UnmapMainImage
    PID:2228
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {FDFE65F8-84B3-4343-998D-4F956AA96300} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2288
    • C:\PROGRA~3\Mozilla\pfwoyhh.exe
      C:\PROGRA~3\Mozilla\pfwoyhh.exe -zhxzcvh
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of UnmapMainImage
      PID:3044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~3\Mozilla\pfwoyhh.exe

    Filesize

    210KB

    MD5

    57d67b0430d332c9e003b017ef79fafa

    SHA1

    416c3622a25cd7c9b5700891780766ff60c37b64

    SHA256

    88aca7961c98eb0d82329b14081c90d74252d76e6f0daf8b3d5ca8aa211d11fc

    SHA512

    e07fc775a5c3a91fba2624181f222104e67607d6acae5d27a65589102925f3d1b29b1c4a491dba1d7bfa5c3be38fbd4c7739b9ea640f532efb58a1c9e29125db

  • memory/2228-0-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/2228-1-0x00000000002C0000-0x00000000002E7000-memory.dmp

    Filesize

    156KB

  • memory/2228-2-0x0000000000442000-0x0000000000443000-memory.dmp

    Filesize

    4KB

  • memory/2228-3-0x0000000000310000-0x000000000036C000-memory.dmp

    Filesize

    368KB

  • memory/2228-4-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2228-6-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2228-7-0x00000000002C0000-0x00000000002E7000-memory.dmp

    Filesize

    156KB

  • memory/3044-11-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/3044-12-0x00000000003A0000-0x00000000003FC000-memory.dmp

    Filesize

    368KB

  • memory/3044-13-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/3044-15-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB