Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 14:50
Static task
static1
Behavioral task
behavioral1
Sample
0c29a3d8518291239fdcaa1e092d1300N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
0c29a3d8518291239fdcaa1e092d1300N.exe
Resource
win10v2004-20240704-en
General
-
Target
0c29a3d8518291239fdcaa1e092d1300N.exe
-
Size
162KB
-
MD5
0c29a3d8518291239fdcaa1e092d1300
-
SHA1
c7d2283eaf07e08cc98e62aa834317765a44bb98
-
SHA256
17a1fb58413f83fc93fca683a4eb78d74bffd2cc02d5d25cf23018c8fe219afd
-
SHA512
166214f0680a93a4a206e0ac388f519b844e8e5335906b5e2296c4a5ff4e3221f60d6c9556f6da99268413824cd8c0a135290009e9c54b646ff748f3a5d257e4
-
SSDEEP
3072:51oVtum4WHvjVGr8kgB9s8p+uRcKVHM0lma3UroAew5ak23n2MgN8DljR:5mtmCjkU9Wu6uFYwsegak22TQll
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 2900 qxyyhdc.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\qxyyhdc.exe 0c29a3d8518291239fdcaa1e092d1300N.exe File created C:\PROGRA~3\Mozilla\qidkayh.dll qxyyhdc.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2708 0c29a3d8518291239fdcaa1e092d1300N.exe 2900 qxyyhdc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2760 wrote to memory of 2900 2760 taskeng.exe 31 PID 2760 wrote to memory of 2900 2760 taskeng.exe 31 PID 2760 wrote to memory of 2900 2760 taskeng.exe 31 PID 2760 wrote to memory of 2900 2760 taskeng.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c29a3d8518291239fdcaa1e092d1300N.exe"C:\Users\Admin\AppData\Local\Temp\0c29a3d8518291239fdcaa1e092d1300N.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2708
-
C:\Windows\system32\taskeng.exetaskeng.exe {CA5DE706-FF3A-4740-9697-045E36F7A338} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\PROGRA~3\Mozilla\qxyyhdc.exeC:\PROGRA~3\Mozilla\qxyyhdc.exe -tljcocn2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
162KB
MD57bf73acaf7da085dd132223fff89021c
SHA13b653ba43d690f8c0735165fe04a0cfd86c10532
SHA2567da79a31787a6cf957ae3ee2bbd1a5c1d3bd89be968249f9004d4024e3969e7f
SHA512021984e52a769493f57cd99b607ce1fe818ccbb43a2c83a0eaed2f90bf11fef295e22b4d6a6bcfa1f02cf23d95819027edffd559f7ad07c8542c4e7d0193f821