Analysis
-
max time kernel
15s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 20:24
Static task
static1
Behavioral task
behavioral1
Sample
502cadf79cbea7797ec7ef383f12f130N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
502cadf79cbea7797ec7ef383f12f130N.exe
Resource
win10v2004-20240709-en
General
-
Target
502cadf79cbea7797ec7ef383f12f130N.exe
-
Size
180KB
-
MD5
502cadf79cbea7797ec7ef383f12f130
-
SHA1
dc5f398dbe7cd7455711566432292781ab61f39e
-
SHA256
e374453b537ff2927e2a558c82326d1714b9e24f9977287c079ffb19ea8f1834
-
SHA512
a50bc3387f3de7e2e329caa182631c07d51c967e078071ed0b28525803f8baf749ac6bf4dc4a3b98f00bc67ff28ad185eb1cab97ff46946989d7f8d50e602462
-
SSDEEP
3072:6chyinW3ky2yCvryQUFrUUOxjnw89JnszQcJdXo:ain4kB+ZUUOxF52dXo
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 3068 shzxojm.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\shzxojm.exe 502cadf79cbea7797ec7ef383f12f130N.exe File created C:\PROGRA~3\Mozilla\axpbjmm.dll shzxojm.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shzxojm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 502cadf79cbea7797ec7ef383f12f130N.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2496 502cadf79cbea7797ec7ef383f12f130N.exe 3068 shzxojm.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2492 wrote to memory of 3068 2492 taskeng.exe 32 PID 2492 wrote to memory of 3068 2492 taskeng.exe 32 PID 2492 wrote to memory of 3068 2492 taskeng.exe 32 PID 2492 wrote to memory of 3068 2492 taskeng.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\502cadf79cbea7797ec7ef383f12f130N.exe"C:\Users\Admin\AppData\Local\Temp\502cadf79cbea7797ec7ef383f12f130N.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2496
-
C:\Windows\system32\taskeng.exetaskeng.exe {8E8AEA14-196E-46D5-B416-0A0687849049} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\PROGRA~3\Mozilla\shzxojm.exeC:\PROGRA~3\Mozilla\shzxojm.exe -lxzgtlg2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD501c1c10ce6c0cbdfbca6655da6aea2ed
SHA1628930fdd72bfb27b1f55cfa9897aea29d2f9d9e
SHA256014927eead558ef3750599cd2e5363b3a9f62b7c5336d4efce123944ce05a9f6
SHA5127a1218c40b5a7c6263dea1602fe33dfa6bcbda65a845572ff996afb2bb2a241af51bcde8e1bd7f9acb6958da020a55598132b279d4f8019248ea37b2c74e2120