Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07-08-2024 05:15
Static task
static1
Behavioral task
behavioral1
Sample
6c0f359ab32f57bc9a44447ad760f370N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6c0f359ab32f57bc9a44447ad760f370N.exe
Resource
win10v2004-20240802-en
General
-
Target
6c0f359ab32f57bc9a44447ad760f370N.exe
-
Size
250KB
-
MD5
6c0f359ab32f57bc9a44447ad760f370
-
SHA1
d60bfeebd815d655ea4037cf2254262f5645f184
-
SHA256
88f39b74cd6c2e7f71ce7d3887cd48369183084355bb87bc368b0abad20f61c3
-
SHA512
d3af5e7ff23a17a8fcc7e2fd02be8462c10a086e54af293888c99f2ae6009de5020e945120938615dabb4999fd9471b97736a209a6350adbd6d673f40781788e
-
SSDEEP
6144:7sZJCstu4PJg5/Ly0d8YaDRVHTVtSbGqJ2:Yy5zyNYaHHDSG
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 2740 iqncgig.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\iqncgig.exe 6c0f359ab32f57bc9a44447ad760f370N.exe File created C:\PROGRA~3\Mozilla\buwmlrn.dll iqncgig.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iqncgig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6c0f359ab32f57bc9a44447ad760f370N.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2388 6c0f359ab32f57bc9a44447ad760f370N.exe 2740 iqncgig.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1632 wrote to memory of 2740 1632 taskeng.exe 30 PID 1632 wrote to memory of 2740 1632 taskeng.exe 30 PID 1632 wrote to memory of 2740 1632 taskeng.exe 30 PID 1632 wrote to memory of 2740 1632 taskeng.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c0f359ab32f57bc9a44447ad760f370N.exe"C:\Users\Admin\AppData\Local\Temp\6c0f359ab32f57bc9a44447ad760f370N.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2388
-
C:\Windows\system32\taskeng.exetaskeng.exe {6D8334FB-AFAB-4174-B893-08C9D9061951} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\PROGRA~3\Mozilla\iqncgig.exeC:\PROGRA~3\Mozilla\iqncgig.exe -txnfdsi2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
250KB
MD58e005ce85d90e7614ece9d292340cc0c
SHA1828a445d75d4c2ee5155937ed57204511d37e11e
SHA2566541abe5aa66539c4bfaaecf3c9860be03dafdf341183ae72ca4cfbddef0f009
SHA512e71ccc7aa661a45c205755b7bcd449559b27af030ed83d255422b45e97639b78250eb6c8d27efea45d6ab07fba05509bfdf86f6a7fa2318bf5bcaa2e636ab88c