Analysis
-
max time kernel
17s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 03:13
Static task
static1
Behavioral task
behavioral1
Sample
d44281e2cc355bcfd174f8ada5dca1ba5001ed3faaa5acfe3883c5c60e8d2be0.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d44281e2cc355bcfd174f8ada5dca1ba5001ed3faaa5acfe3883c5c60e8d2be0.exe
Resource
win10v2004-20240704-en
General
-
Target
d44281e2cc355bcfd174f8ada5dca1ba5001ed3faaa5acfe3883c5c60e8d2be0.exe
-
Size
276KB
-
MD5
c002784bcba8e4f954f222e187eaf605
-
SHA1
db77d2d7b4ba3873ac884d22393b14faea7a17fb
-
SHA256
d44281e2cc355bcfd174f8ada5dca1ba5001ed3faaa5acfe3883c5c60e8d2be0
-
SHA512
c49e9f25af13c95959a503e8ef621bf47e09e1bb1a1e1fb0a7462054a9c03b816ac907025629b638275ff84fcd502ebd66b1b3917bfef1d836cd4da9ee0ced33
-
SSDEEP
6144:5ST/k0YujFn2CfBoZG3gLm5WelllPJ7ImcS:AsxujcCfOBoDN9Im5
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 2872 iqncgig.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\iqncgig.exe d44281e2cc355bcfd174f8ada5dca1ba5001ed3faaa5acfe3883c5c60e8d2be0.exe File created C:\PROGRA~3\Mozilla\buwmlrn.dll iqncgig.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1272 d44281e2cc355bcfd174f8ada5dca1ba5001ed3faaa5acfe3883c5c60e8d2be0.exe 2872 iqncgig.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2872 2764 taskeng.exe 30 PID 2764 wrote to memory of 2872 2764 taskeng.exe 30 PID 2764 wrote to memory of 2872 2764 taskeng.exe 30 PID 2764 wrote to memory of 2872 2764 taskeng.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d44281e2cc355bcfd174f8ada5dca1ba5001ed3faaa5acfe3883c5c60e8d2be0.exe"C:\Users\Admin\AppData\Local\Temp\d44281e2cc355bcfd174f8ada5dca1ba5001ed3faaa5acfe3883c5c60e8d2be0.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1272
-
C:\Windows\system32\taskeng.exetaskeng.exe {6D8334FB-AFAB-4174-B893-08C9D9061951} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\PROGRA~3\Mozilla\iqncgig.exeC:\PROGRA~3\Mozilla\iqncgig.exe -txnfdsi2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
276KB
MD53857e38d15f4d83822fa507fd21101ec
SHA1d40f95a512f4c97a5fee3ff2f64d058ae19799cd
SHA256ea659557ef7b8954336e832faa547cd331b07f669808187b937ba816a1e47628
SHA5129acc187d4b8b637b389c93ca2f8abe201580bad676beafa0033ea7dda3c39276f7fb439145ee863f85e5d5e671c31b06f9270dbe018d28993ecf92c6004615a6