Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
07/08/2024, 00:15
Static task
static1
Behavioral task
behavioral1
Sample
321019543bcbbb982a88a5602e7761b0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
321019543bcbbb982a88a5602e7761b0N.exe
Resource
win10v2004-20240802-en
General
-
Target
321019543bcbbb982a88a5602e7761b0N.exe
-
Size
137KB
-
MD5
321019543bcbbb982a88a5602e7761b0
-
SHA1
0e3ca134dc42307e19844cb5a41b1c703dccddb6
-
SHA256
92ccb2a00bde59776783b57d5c65062bc9f5bc602f6c425a4572cada093c7bf6
-
SHA512
23557650bf20701d3db6b0a0beced44e99590c58c8365eb6c5741fadf956d3481239ac63e09eb30099455624c42cb16e01da714fefd74e6c20d57cf24f124cb5
-
SSDEEP
3072:9/eOrj+K1j+stAo7jpD73KvTYEIQkeJMF:FBlAQd3eCQTJM
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 2828 bjxxeqk.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\bjxxeqk.exe 321019543bcbbb982a88a5602e7761b0N.exe File created C:\PROGRA~3\Mozilla\gyntqrd.dll bjxxeqk.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 321019543bcbbb982a88a5602e7761b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bjxxeqk.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2828 2672 taskeng.exe 31 PID 2672 wrote to memory of 2828 2672 taskeng.exe 31 PID 2672 wrote to memory of 2828 2672 taskeng.exe 31 PID 2672 wrote to memory of 2828 2672 taskeng.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\321019543bcbbb982a88a5602e7761b0N.exe"C:\Users\Admin\AppData\Local\Temp\321019543bcbbb982a88a5602e7761b0N.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:3068
-
C:\Windows\system32\taskeng.exetaskeng.exe {D882C2EF-8EF3-47CF-8D60-389CCE3EAC0E} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\PROGRA~3\Mozilla\bjxxeqk.exeC:\PROGRA~3\Mozilla\bjxxeqk.exe -tggqwii2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
137KB
MD5a0dac46f6136fa350789505412fd0c25
SHA1e217b433681fbb7ff89143794e354547f0562c93
SHA256e10841b611460442ef91b2aedf8f9f397cf4ee122666551da1e28ff40efc919f
SHA512c9494d9c2af76347856c989eef288a67b2ef0de1aeb1b798b41b27f66a19f1249befdc56ef24c5be0297c420d26f485b0df2db189b5bffd7c0e14e1acfa0d199