Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/09/2024, 06:41
Static task
static1
Behavioral task
behavioral1
Sample
b8313eb56ff7e86669521a48028a40f0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b8313eb56ff7e86669521a48028a40f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
b8313eb56ff7e86669521a48028a40f0N.exe
-
Size
225KB
-
MD5
b8313eb56ff7e86669521a48028a40f0
-
SHA1
9ecc4f428c37e7c83c6b35abbc27997d300bd180
-
SHA256
5cf82f8250073228efbd7d2e78d9069dbca7611fe6e8c8ff6c3b64923aff672d
-
SHA512
c4120b7c9981d5918d757be75cfce978646e7a26f26413d5c3bfbd54a5d55d68556067a650b12f629dbbc0b71adc0b62577faafb9ea0bf80ec810d9a3ba0664d
-
SSDEEP
3072:vtbbbbFLcM92DCfh8fcAMzFzMJvb8RZabP4QEP7EPaERzcUf7lPasVOCvFmqcCzS:vom2efufqcdzfvV4PdAJk08Rv
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 2568 dxphjxh.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\dxphjxh.exe b8313eb56ff7e86669521a48028a40f0N.exe File created C:\PROGRA~3\Mozilla\yocgcxd.dll dxphjxh.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8313eb56ff7e86669521a48028a40f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxphjxh.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1736 b8313eb56ff7e86669521a48028a40f0N.exe 2568 dxphjxh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2568 1680 taskeng.exe 29 PID 1680 wrote to memory of 2568 1680 taskeng.exe 29 PID 1680 wrote to memory of 2568 1680 taskeng.exe 29 PID 1680 wrote to memory of 2568 1680 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8313eb56ff7e86669521a48028a40f0N.exe"C:\Users\Admin\AppData\Local\Temp\b8313eb56ff7e86669521a48028a40f0N.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:1736
-
C:\Windows\system32\taskeng.exetaskeng.exe {F67A3B30-D7B9-48C0-862D-545B1194A149} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\PROGRA~3\Mozilla\dxphjxh.exeC:\PROGRA~3\Mozilla\dxphjxh.exe -wyqgbfl2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
225KB
MD5c273be55982b8907813aee9e27056078
SHA1101512ff1a0ab2f80264567fdb24e7e19a66eef7
SHA256487c82835094a500bda09cab5ec745f6df12c9cf4a634d816999c89153773bb3
SHA51237f526050e2c7ac6a271285cdaf31656a80356dba98d0e8a404fb4810ce605ed5ae5ff314dd6dcabeaeca65ef56ec540aa904963a9cac9342d9b1b4fc4659ad7