Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/10/2024, 15:19
Static task
static1
Behavioral task
behavioral1
Sample
muzyika__na_teplohode_muzyika_igraet.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
muzyika__na_teplohode_muzyika_igraet.exe
Resource
win10v2004-20241007-en
General
-
Target
muzyika__na_teplohode_muzyika_igraet.exe
-
Size
284KB
-
MD5
a9ffd82eab69124f800032d78ef61dee
-
SHA1
47d06f324d2512d8452768ae676a87ddf3bc743a
-
SHA256
fe8f7382181eda105f15b85f02e2b3643d81ebbdea878b3a1f963ba966f775d4
-
SHA512
da770da169c485574b8556ed2d1ae5d341cbf97fabfbda367e9fe8877b91e6df12bd0866f66f981effb98a00ba3133d82ca00467b16019c37d63bd1ee0b9c219
-
SSDEEP
6144:a5+2BxAWURf/8o/68i62dsbh/x205t4DiI27zzl7FbSbGqJ:aE5WURf/8oCP62WJ205t4DX8zzl7FbS
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 1608 whmlgxa.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\whmlgxa.exe muzyika__na_teplohode_muzyika_igraet.exe File created C:\PROGRA~3\Mozilla\jddgeih.dll whmlgxa.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language muzyika__na_teplohode_muzyika_igraet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language whmlgxa.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1708 muzyika__na_teplohode_muzyika_igraet.exe 1608 whmlgxa.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2348 wrote to memory of 1608 2348 taskeng.exe 32 PID 2348 wrote to memory of 1608 2348 taskeng.exe 32 PID 2348 wrote to memory of 1608 2348 taskeng.exe 32 PID 2348 wrote to memory of 1608 2348 taskeng.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\muzyika__na_teplohode_muzyika_igraet.exe"C:\Users\Admin\AppData\Local\Temp\muzyika__na_teplohode_muzyika_igraet.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:1708
-
C:\Windows\system32\taskeng.exetaskeng.exe {D933DB3B-C2B4-485A-8F51-D24DEB5D2533} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\PROGRA~3\Mozilla\whmlgxa.exeC:\PROGRA~3\Mozilla\whmlgxa.exe -yvexadc2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:1608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD5af469187e1ecc1fc6dd64788cb2ec1ca
SHA1c5f41d9bf27311149b13a2a43e045d4ad85c703a
SHA256e2d9718d7b9623c8f0a5585862a0754974b0af1107f8878703d4e526e6a2746f
SHA51291a4255e594ab6794c0248d50ed92ecc915b016db8707a14a2ff8a87b057844ef821930ac761ee5a962e8df843647f6b9f29fb9a631d5a9ab588c2c0815a3091