Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 21:52
Static task
static1
Behavioral task
behavioral1
Sample
5754f2d8fdc19569e43d2831f18944eab227cf06488bbbdd06f35c8384077b4d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5754f2d8fdc19569e43d2831f18944eab227cf06488bbbdd06f35c8384077b4d.exe
Resource
win10v2004-20240226-en
General
-
Target
5754f2d8fdc19569e43d2831f18944eab227cf06488bbbdd06f35c8384077b4d.exe
-
Size
210KB
-
MD5
436e61a47c0bf6516e9f4d9586541d79
-
SHA1
5edd9dfa058d0d3d75615289d8ff61a5e22975a3
-
SHA256
5754f2d8fdc19569e43d2831f18944eab227cf06488bbbdd06f35c8384077b4d
-
SHA512
d35e228e5f0c7ddaa4d02b6d228b4ba340946f0cb90b055b2b0052eefed1bdd5ec41e5d8211526b78f1196bcfdc845e9b52a8f8c38c7bdbdc557b268933e9aa5
-
SSDEEP
6144:H0Ys9g6Bbsp3wXSy7hEjN2Vjthzm/c2SbGqJt:HJsK60gXSjAVjS7Sd
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
Processes:
pfwoyhh.exepid process 3044 pfwoyhh.exe -
Drops file in Program Files directory 2 IoCs
Processes:
5754f2d8fdc19569e43d2831f18944eab227cf06488bbbdd06f35c8384077b4d.exepfwoyhh.exedescription ioc process File created C:\PROGRA~3\Mozilla\pfwoyhh.exe 5754f2d8fdc19569e43d2831f18944eab227cf06488bbbdd06f35c8384077b4d.exe File created C:\PROGRA~3\Mozilla\bjvdwgg.dll pfwoyhh.exe -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
5754f2d8fdc19569e43d2831f18944eab227cf06488bbbdd06f35c8384077b4d.exepfwoyhh.exepid process 2228 5754f2d8fdc19569e43d2831f18944eab227cf06488bbbdd06f35c8384077b4d.exe 3044 pfwoyhh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 2288 wrote to memory of 3044 2288 taskeng.exe pfwoyhh.exe PID 2288 wrote to memory of 3044 2288 taskeng.exe pfwoyhh.exe PID 2288 wrote to memory of 3044 2288 taskeng.exe pfwoyhh.exe PID 2288 wrote to memory of 3044 2288 taskeng.exe pfwoyhh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5754f2d8fdc19569e43d2831f18944eab227cf06488bbbdd06f35c8384077b4d.exe"C:\Users\Admin\AppData\Local\Temp\5754f2d8fdc19569e43d2831f18944eab227cf06488bbbdd06f35c8384077b4d.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2228
-
C:\Windows\system32\taskeng.exetaskeng.exe {FDFE65F8-84B3-4343-998D-4F956AA96300} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\PROGRA~3\Mozilla\pfwoyhh.exeC:\PROGRA~3\Mozilla\pfwoyhh.exe -zhxzcvh2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD557d67b0430d332c9e003b017ef79fafa
SHA1416c3622a25cd7c9b5700891780766ff60c37b64
SHA25688aca7961c98eb0d82329b14081c90d74252d76e6f0daf8b3d5ca8aa211d11fc
SHA512e07fc775a5c3a91fba2624181f222104e67607d6acae5d27a65589102925f3d1b29b1c4a491dba1d7bfa5c3be38fbd4c7739b9ea640f532efb58a1c9e29125db