Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03/09/2024, 02:15
Static task
static1
Behavioral task
behavioral1
Sample
b06461681b197b594ce94e448a5d37b0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b06461681b197b594ce94e448a5d37b0N.exe
Resource
win10v2004-20240802-en
General
-
Target
b06461681b197b594ce94e448a5d37b0N.exe
-
Size
216KB
-
MD5
b06461681b197b594ce94e448a5d37b0
-
SHA1
460445341939cb2cdd385fb4cfdfd6a1b29c570b
-
SHA256
14a68f6897a1184534129982147aff9405130d87f4fc5afab461530984a6fd50
-
SHA512
154d4c7287d5a7fb71373f2e9d8396dafca47ef7b296112c74b26221babd17e1c9a5881bade4077c6da45904734d418d27b03effd4bcca031b7af7910155b2c1
-
SSDEEP
3072:HgMRUseV3VZ9CL21CaHsOHVeQeH9bdPi2bElE8LOOOOyIk3Zmokfp:AMahnfy21DMOILH95PLQROOOOyRmoS
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 2340 yofzeuh.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\yofzeuh.exe b06461681b197b594ce94e448a5d37b0N.exe File created C:\PROGRA~3\Mozilla\mkkxkvk.dll yofzeuh.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b06461681b197b594ce94e448a5d37b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yofzeuh.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2356 b06461681b197b594ce94e448a5d37b0N.exe 2340 yofzeuh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2340 2528 taskeng.exe 31 PID 2528 wrote to memory of 2340 2528 taskeng.exe 31 PID 2528 wrote to memory of 2340 2528 taskeng.exe 31 PID 2528 wrote to memory of 2340 2528 taskeng.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b06461681b197b594ce94e448a5d37b0N.exe"C:\Users\Admin\AppData\Local\Temp\b06461681b197b594ce94e448a5d37b0N.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2356
-
C:\Windows\system32\taskeng.exetaskeng.exe {8E1E1840-FB5A-445B-BE3B-4DA4F8B671F1} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\PROGRA~3\Mozilla\yofzeuh.exeC:\PROGRA~3\Mozilla\yofzeuh.exe -qmgjyzc2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD512cec44bc284e21d20ad5ee1a79de3b8
SHA1f26b0e0831aa392d05640cc75a80ddaac7371b83
SHA256a590d67ae8472e5ad03c77ef4a1a05d88abc69b4013e0c46516885c6b0952c92
SHA512f1cf40ca6c4e3674b531563be91315d6aa56a1b567fc6477fcb6ca81c2509acf00a76706b980521e2098d32d0662a26be069b3269c355963fada3e788de7961d