Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
16/08/2024, 23:19
Static task
static1
Behavioral task
behavioral1
Sample
5bad5d9942a74f6172194aaa5e07d782231fc042f4448e428dc193db823761b3.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5bad5d9942a74f6172194aaa5e07d782231fc042f4448e428dc193db823761b3.exe
Resource
win10v2004-20240802-en
General
-
Target
5bad5d9942a74f6172194aaa5e07d782231fc042f4448e428dc193db823761b3.exe
-
Size
205KB
-
MD5
3d87fc02f2ad5b319bb88003486a1e44
-
SHA1
2b959ee8d7ed9e9984e0ca2ec794e982e049f5b6
-
SHA256
5bad5d9942a74f6172194aaa5e07d782231fc042f4448e428dc193db823761b3
-
SHA512
361ffd68c669dd5ae8ef98c240d7b68a24b4e9339ab83b51147fccfc01f71c5bd3499ef1da26007f261b1c4370094f8b8f3f73cefb74cd9afd9f44ba346323b4
-
SSDEEP
3072:2+ejgWgTsDAJJRjOV2/pwb5ryT5tlDhB2IFTLFZhh2D+0caj3kyRACHfI:qjg3JJF35tlDhB2Cn9ozHfI
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 2692 shzxojm.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\shzxojm.exe 5bad5d9942a74f6172194aaa5e07d782231fc042f4448e428dc193db823761b3.exe File created C:\PROGRA~3\Mozilla\axpbjmm.dll shzxojm.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5bad5d9942a74f6172194aaa5e07d782231fc042f4448e428dc193db823761b3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shzxojm.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2988 5bad5d9942a74f6172194aaa5e07d782231fc042f4448e428dc193db823761b3.exe 2692 shzxojm.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1304 wrote to memory of 2692 1304 taskeng.exe 31 PID 1304 wrote to memory of 2692 1304 taskeng.exe 31 PID 1304 wrote to memory of 2692 1304 taskeng.exe 31 PID 1304 wrote to memory of 2692 1304 taskeng.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bad5d9942a74f6172194aaa5e07d782231fc042f4448e428dc193db823761b3.exe"C:\Users\Admin\AppData\Local\Temp\5bad5d9942a74f6172194aaa5e07d782231fc042f4448e428dc193db823761b3.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2988
-
C:\Windows\system32\taskeng.exetaskeng.exe {72D96D1D-2EAA-4D27-91EE-1D7F8B40B6D0} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\PROGRA~3\Mozilla\shzxojm.exeC:\PROGRA~3\Mozilla\shzxojm.exe -lxzgtlg2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD5092cbb541cf64ccb14c24f933eb11bfe
SHA144a1d900e27e57b2201cc6a95488378b756245a1
SHA256e02147b05723c936a0399d4c28a4378b329d82f8a53c7d4efbf4eb30107b568f
SHA5125909c73a82a29ddabfa3101923a60fa23b983b31dc4754247738c97cb9ceb6b87f9be7848171c69154ac230ffef8401b3ee1e88d75e9a4e818523876b9cbb7f4