Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06/08/2024, 17:59
Behavioral task
behavioral1
Sample
d5ada372e0535645411994963a3e8330N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d5ada372e0535645411994963a3e8330N.exe
Resource
win10v2004-20240802-en
General
-
Target
d5ada372e0535645411994963a3e8330N.exe
-
Size
448KB
-
MD5
d5ada372e0535645411994963a3e8330
-
SHA1
d9dc76fcbb94958213c45ff3dd3e2bc703b18a7c
-
SHA256
f999d5bc26352386472f45323b75bbe4beee2a2a4b8efa1abe538d12218aecfe
-
SHA512
baff4406e1301cf7625c5c0e710d9652e8d8b29e652a5888849cb8c3573cb00034efd927aec8591fc887a8d742c20cb5ae57191de82a5465f42ba702df99d75d
-
SSDEEP
6144:i4/LuS+WcPmKmsEsY9RqSs3JqyiZdMFKr:PL25msWs3AD
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 2684 yofzeuh.exe -
resource yara_rule behavioral1/files/0x00360000000160e7-5.dat upx behavioral1/memory/2684-7-0x0000000000400000-0x0000000000470000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\yofzeuh.exe d5ada372e0535645411994963a3e8330N.exe File created C:\PROGRA~3\Mozilla\mkkxkvk.dll yofzeuh.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5ada372e0535645411994963a3e8330N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yofzeuh.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3020 d5ada372e0535645411994963a3e8330N.exe 2684 yofzeuh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2776 wrote to memory of 2684 2776 taskeng.exe 31 PID 2776 wrote to memory of 2684 2776 taskeng.exe 31 PID 2776 wrote to memory of 2684 2776 taskeng.exe 31 PID 2776 wrote to memory of 2684 2776 taskeng.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5ada372e0535645411994963a3e8330N.exe"C:\Users\Admin\AppData\Local\Temp\d5ada372e0535645411994963a3e8330N.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:3020
-
C:\Windows\system32\taskeng.exetaskeng.exe {D5B151A8-2DE5-49EF-9C20-E84A4C495A27} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\PROGRA~3\Mozilla\yofzeuh.exeC:\PROGRA~3\Mozilla\yofzeuh.exe -qmgjyzc2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
448KB
MD563f242ca07dc02aad9f79580243b93d7
SHA18d5406abf6d69991dedc770efbf612cbc699996c
SHA2561f829d2e14cc3f4d45f8f1a4e4632990d0b05e09bfb45d560884e24d983953c8
SHA5124c70c1c9759a0f3e94104aed2f22f0d5bd388efb954e0c56d04ff9c870bb17bdea6c115ce5246ba0e8ad81e01d2dc7f74028837719505fcc0c8c04a7052475fb