Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 05:20
Static task
static1
Behavioral task
behavioral1
Sample
439afa6b15ef0dcbba3f0cf33bd6dc1147802817f4b50af383099fc10622f17cN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
439afa6b15ef0dcbba3f0cf33bd6dc1147802817f4b50af383099fc10622f17cN.exe
Resource
win10v2004-20241007-en
General
-
Target
439afa6b15ef0dcbba3f0cf33bd6dc1147802817f4b50af383099fc10622f17cN.exe
-
Size
182KB
-
MD5
767e2900bc4ede8191eac87755c03fb0
-
SHA1
5f27077399f2b86ca6b2ae1db374048ec8c48bd7
-
SHA256
439afa6b15ef0dcbba3f0cf33bd6dc1147802817f4b50af383099fc10622f17c
-
SHA512
0c0d9a8d5482e3e9d752a28c96283581081f2dc8ea63edf8c17384325a9d21e61e2d0a8ea789f379eac2ad5e700e6f3980ff4a39a74e26222b88aee5270568cd
-
SSDEEP
3072:5ychyinW3k9savZ/5d18Lp2AwF+/xjnw89JnszQcJdXAo:5Cin4kmavZ/5dxvFwxF52dX/
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 2540 dxphjxh.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\dxphjxh.exe 439afa6b15ef0dcbba3f0cf33bd6dc1147802817f4b50af383099fc10622f17cN.exe File created C:\PROGRA~3\Mozilla\yocgcxd.dll dxphjxh.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 439afa6b15ef0dcbba3f0cf33bd6dc1147802817f4b50af383099fc10622f17cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxphjxh.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2396 439afa6b15ef0dcbba3f0cf33bd6dc1147802817f4b50af383099fc10622f17cN.exe 2540 dxphjxh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2540 2160 taskeng.exe 31 PID 2160 wrote to memory of 2540 2160 taskeng.exe 31 PID 2160 wrote to memory of 2540 2160 taskeng.exe 31 PID 2160 wrote to memory of 2540 2160 taskeng.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\439afa6b15ef0dcbba3f0cf33bd6dc1147802817f4b50af383099fc10622f17cN.exe"C:\Users\Admin\AppData\Local\Temp\439afa6b15ef0dcbba3f0cf33bd6dc1147802817f4b50af383099fc10622f17cN.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2396
-
C:\Windows\system32\taskeng.exetaskeng.exe {9BCCB09E-F77A-4F85-ACCB-A0930A445B3E} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\PROGRA~3\Mozilla\dxphjxh.exeC:\PROGRA~3\Mozilla\dxphjxh.exe -wyqgbfl2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182KB
MD5337c1e3841fbe195170041d6f604ff86
SHA1ed9add5363ce78c96cb6f1c49a7dab0b49725254
SHA256feb6297ec19e7866462d42659f094af356400c3035c929b611190a2e20b03662
SHA5121cdb4ff70b35293a3c21fcf27ba61c2dc69c2026cdf8e3518979f9871de7077b4d05980e5ab71b11af6b97faacd2cd3b2b7bdde83d494347ef0e97836949c646