Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/06/2024, 22:01
Static task
static1
Behavioral task
behavioral1
Sample
0a4b50e51c633dd177821bb8662c8b76de8fc0d5d9b50846b1ac3fd1e749c467.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0a4b50e51c633dd177821bb8662c8b76de8fc0d5d9b50846b1ac3fd1e749c467.exe
Resource
win10v2004-20240426-en
General
-
Target
0a4b50e51c633dd177821bb8662c8b76de8fc0d5d9b50846b1ac3fd1e749c467.exe
-
Size
278KB
-
MD5
3c90c04e5d8039132797b8ff2cc5ba4e
-
SHA1
f7a8279383da93729efe498a5c4a840ebee396c3
-
SHA256
0a4b50e51c633dd177821bb8662c8b76de8fc0d5d9b50846b1ac3fd1e749c467
-
SHA512
962dc3edc31e0c219fae7f39af460bcb3d6c85af1bdf75bf0a7912ba951e7ba9a2d5d8df8baa095cf5caae77496467b312c16e463d196f7ed79d2dc252ea4f2c
-
SSDEEP
6144:jn5V/TLgOnNvGFWz3SW9Wv1ZwjKIzyQb01RTcM:H/vgavGFWz3SMu4jpfbNM
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2688 gjsfhjk.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\gjsfhjk.exe 0a4b50e51c633dd177821bb8662c8b76de8fc0d5d9b50846b1ac3fd1e749c467.exe File created C:\PROGRA~3\Mozilla\eurgebe.dll gjsfhjk.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1216 wrote to memory of 2688 1216 taskeng.exe 29 PID 1216 wrote to memory of 2688 1216 taskeng.exe 29 PID 1216 wrote to memory of 2688 1216 taskeng.exe 29 PID 1216 wrote to memory of 2688 1216 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a4b50e51c633dd177821bb8662c8b76de8fc0d5d9b50846b1ac3fd1e749c467.exe"C:\Users\Admin\AppData\Local\Temp\0a4b50e51c633dd177821bb8662c8b76de8fc0d5d9b50846b1ac3fd1e749c467.exe"1⤵
- Drops file in Program Files directory
PID:2252
-
C:\Windows\system32\taskeng.exetaskeng.exe {F66C5EBB-AAE7-4D0F-8E7A-1E54FEF482AC} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\PROGRA~3\Mozilla\gjsfhjk.exeC:\PROGRA~3\Mozilla\gjsfhjk.exe -tuxiydl2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
278KB
MD5004da5ba8d1f0fe733423370eb21845a
SHA16eda3a2e6821f014bf6a1fbb86493626863038fe
SHA256ee464826bbb9151546c4eb7411595d5269587540e6c18f088a20aadce8ddfdd7
SHA512bbcd4899bc68604c0b754f6f47904009f4c17abe14e94bdb8e8a76603f2874c2aefdfa670ae42cd64f8993e39a9214c7f38bb055b6333af7e74b4adc7478ffed